Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40328 (GCVE-0-2025-40328)
Vulnerability from cvelistv5 – Published: 2025-12-09 04:09 – Updated: 2025-12-09 04:09| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
ebe98f1447bbccf8228335c62d86af02a0ed23f7 , < cb52d9c86d70298de0ab7c7953653898cbc0efd6
(git)
Affected: ebe98f1447bbccf8228335c62d86af02a0ed23f7 , < 065bd62412271a2d734810dd50336cae88c54427 (git) Affected: ebe98f1447bbccf8228335c62d86af02a0ed23f7 , < bdb596ceb4b7c3f28786a33840263728217fbcf5 (git) Affected: ebe98f1447bbccf8228335c62d86af02a0ed23f7 , < 734e99623c5b65bf2c03e35978a0b980ebc3c2f8 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/client/cached_dir.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "cb52d9c86d70298de0ab7c7953653898cbc0efd6",
"status": "affected",
"version": "ebe98f1447bbccf8228335c62d86af02a0ed23f7",
"versionType": "git"
},
{
"lessThan": "065bd62412271a2d734810dd50336cae88c54427",
"status": "affected",
"version": "ebe98f1447bbccf8228335c62d86af02a0ed23f7",
"versionType": "git"
},
{
"lessThan": "bdb596ceb4b7c3f28786a33840263728217fbcf5",
"status": "affected",
"version": "ebe98f1447bbccf8228335c62d86af02a0ed23f7",
"versionType": "git"
},
{
"lessThan": "734e99623c5b65bf2c03e35978a0b980ebc3c2f8",
"status": "affected",
"version": "ebe98f1447bbccf8228335c62d86af02a0ed23f7",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/smb/client/cached_dir.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.1"
},
{
"lessThan": "6.1",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.117",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.58",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.117",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.58",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.8",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_close_cached_fid()\n\nfind_or_create_cached_dir() could grab a new reference after kref_put()\nhad seen the refcount drop to zero but before cfid_list_lock is acquired\nin smb2_close_cached_fid(), leading to use-after-free.\n\nSwitch to kref_put_lock() so cfid_release() is called with\ncfid_list_lock held, closing that gap."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-09T04:09:44.876Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/cb52d9c86d70298de0ab7c7953653898cbc0efd6"
},
{
"url": "https://git.kernel.org/stable/c/065bd62412271a2d734810dd50336cae88c54427"
},
{
"url": "https://git.kernel.org/stable/c/bdb596ceb4b7c3f28786a33840263728217fbcf5"
},
{
"url": "https://git.kernel.org/stable/c/734e99623c5b65bf2c03e35978a0b980ebc3c2f8"
}
],
"title": "smb: client: fix potential UAF in smb2_close_cached_fid()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40328",
"datePublished": "2025-12-09T04:09:44.876Z",
"dateReserved": "2025-04-16T07:20:57.186Z",
"dateUpdated": "2025-12-09T04:09:44.876Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40328\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-09T16:17:42.903\",\"lastModified\":\"2025-12-09T18:37:13.640\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsmb: client: fix potential UAF in smb2_close_cached_fid()\\n\\nfind_or_create_cached_dir() could grab a new reference after kref_put()\\nhad seen the refcount drop to zero but before cfid_list_lock is acquired\\nin smb2_close_cached_fid(), leading to use-after-free.\\n\\nSwitch to kref_put_lock() so cfid_release() is called with\\ncfid_list_lock held, closing that gap.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/065bd62412271a2d734810dd50336cae88c54427\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/734e99623c5b65bf2c03e35978a0b980ebc3c2f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bdb596ceb4b7c3f28786a33840263728217fbcf5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cb52d9c86d70298de0ab7c7953653898cbc0efd6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
CERTFR-2026-AVI-0170
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2022-50488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50488"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2023-54265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54265"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2022-50676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50676"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50816"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2022-50780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50780"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2023-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52983"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2023-53853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53853"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2022-50580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50580"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50865"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2023-52525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52525"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2023-54218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54218"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2023-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50756"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2023-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52999"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2023-54012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54012"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2022-50786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50786"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260472-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260471-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0474-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260474-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260473-1"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0411-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260411-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0447-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260447-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0475-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260475-1"
}
]
}
CERTFR-2026-AVI-0170
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2022-50488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50488"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2023-54265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54265"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2022-50676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50676"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50816"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2022-50780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50780"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2023-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52983"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2023-53853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53853"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2022-50580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50580"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50865"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2023-52525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52525"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2023-54218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54218"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2023-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50756"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2023-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52999"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2023-54012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54012"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2022-50786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50786"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260472-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260471-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0474-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260474-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260473-1"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0411-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260411-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0447-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260447-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0475-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260475-1"
}
]
}
CERTFR-2026-AVI-0108
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2022-50873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50873"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50867"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53809"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-53833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53833"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2022-50883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50883"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2023-53020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53020"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2023-54132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54132"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2023-54128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54128"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-54074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54074"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2022-50705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50705"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50833"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-54175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54175"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2022-50738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50738"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2024-57849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2022-50723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50723"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2022-50710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50710"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2024-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53164"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2022-50621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50621"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54057"
},
{
"name": "CVE-2022-50714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50714"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38554"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-54041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54041"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53801"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2022-50818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50818"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-56590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-54226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54226"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2022-50665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50665"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2023-54262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54262"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-54238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54238"
},
{
"name": "CVE-2023-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54114"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2022-50838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50838"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50879"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2022-50667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50667"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53718"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2022-50768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50768"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50706"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50701"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54044"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2023-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53769"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54138"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-54144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54144"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2022-50712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50712"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2023-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54116"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2022-50847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50847"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0269-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260269-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0315-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20168-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620168-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0278-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20169-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620169-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0283-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260283-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20163-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620163-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20164-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620164-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0267-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260267-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20148-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620148-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0284-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260284-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0270-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260270-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0274-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0317-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20149-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620149-1"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0305-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260305-1"
},
{
"published_at": "2026-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0263-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260263-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20165-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620165-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0281-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260281-1"
}
]
}
CERTFR-2026-AVI-0128
Vulnerability from certfr_avis - Published: 2026-02-06 - Updated: 2026-02-06
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | ||
| SUSE | N/A | openSUSE Leap 15.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-49291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49291"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2022-49288",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49288"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2022-49733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49733"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-68353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68353"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40214"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2024-56658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56658"
},
{
"name": "CVE-2022-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50282"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2021-47633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47633"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
}
],
"initial_release_date": "2026-02-06T00:00:00",
"last_revision_date": "2026-02-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0128",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0350-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260350-1"
},
{
"published_at": "2026-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0385-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260385-1"
},
{
"published_at": "2026-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0369-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260369-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20220-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620220-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20171-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620171-1"
},
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0352-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260352-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20228-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620228-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20207-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620207-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20202-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620202-1"
}
]
}
CERTFR-2026-AVI-0194
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40151"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40041"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0194",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8048-1",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-5",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-1",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-7",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-5",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-6",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-3",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-5",
"url": "https://ubuntu.com/security/notices/USN-7990-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-2",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-2",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-4",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-3",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"published_at": "2026-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-2",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-6",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-7",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-8",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2026-AVI-0128
Vulnerability from certfr_avis - Published: 2026-02-06 - Updated: 2026-02-06
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | ||
| SUSE | N/A | openSUSE Leap 15.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-49291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49291"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2022-49288",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49288"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2022-49733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49733"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-68353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68353"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40214"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2024-56658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56658"
},
{
"name": "CVE-2022-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50282"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2021-47633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47633"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
}
],
"initial_release_date": "2026-02-06T00:00:00",
"last_revision_date": "2026-02-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0128",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0350-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260350-1"
},
{
"published_at": "2026-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0385-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260385-1"
},
{
"published_at": "2026-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0369-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260369-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20220-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620220-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20171-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620171-1"
},
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0352-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260352-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20228-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620228-1"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20207-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620207-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20202-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620202-1"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2026-AVI-0225
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Micro Extras | SUSE Linux Micro Extras 6.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "SUSE Linux Micro Extras",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0225",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20465-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620465-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20457-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620457-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20461-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620461-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20477-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620477-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20459-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620459-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20468-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620468-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620471-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20464-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620464-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20470-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620470-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0617-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260617-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20458-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620458-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20456-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620456-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620473-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20463-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620463-1"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0587-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260587-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20467-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620467-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20466-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620466-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20478-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620478-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20476-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620476-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20462-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620462-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20460-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620460-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20469-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620469-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20479-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620479-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620472-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20455-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620455-1"
}
]
}
CERTFR-2026-AVI-0227
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0227",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-1",
"url": "https://ubuntu.com/security/notices/USN-8060-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-2",
"url": "https://ubuntu.com/security/notices/USN-8059-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-8",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-4",
"url": "https://ubuntu.com/security/notices/USN-8060-4"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-2",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-2",
"url": "https://ubuntu.com/security/notices/USN-8060-2"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-4",
"url": "https://ubuntu.com/security/notices/USN-8059-4"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-6",
"url": "https://ubuntu.com/security/notices/USN-8059-6"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8061-1",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-3",
"url": "https://ubuntu.com/security/notices/USN-8060-3"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-1",
"url": "https://ubuntu.com/security/notices/USN-8059-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-3",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-5",
"url": "https://ubuntu.com/security/notices/USN-8059-5"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-3",
"url": "https://ubuntu.com/security/notices/USN-8059-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-5",
"url": "https://ubuntu.com/security/notices/USN-8015-5"
}
]
}
CERTFR-2026-AVI-0108
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2022-50873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50873"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50867"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53809"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-53833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53833"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2022-50883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50883"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2023-53020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53020"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2023-54132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54132"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2023-54128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54128"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-54074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54074"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2022-50705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50705"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50833"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-54175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54175"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2022-50738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50738"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2024-57849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2022-50723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50723"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2022-50710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50710"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2024-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53164"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2022-50621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50621"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54057"
},
{
"name": "CVE-2022-50714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50714"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38554"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-54041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54041"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53801"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2022-50818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50818"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-56590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-54226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54226"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2022-50665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50665"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2023-54262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54262"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-54238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54238"
},
{
"name": "CVE-2023-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54114"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2022-50838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50838"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50879"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2022-50667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50667"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53718"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2022-50768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50768"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50706"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50701"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54044"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2023-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53769"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54138"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-54144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54144"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2022-50712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50712"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2023-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54116"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2022-50847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50847"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0269-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260269-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0315-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20168-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620168-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0278-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20169-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620169-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0283-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260283-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20163-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620163-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20164-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620164-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0267-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260267-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20148-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620148-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0284-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260284-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0270-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260270-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0274-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0317-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20149-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620149-1"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0305-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260305-1"
},
{
"published_at": "2026-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0263-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260263-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20165-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620165-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0281-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260281-1"
}
]
}
SUSE-SU-2026:0447-1
Vulnerability from csaf_suse - Published: 2026-02-11 14:05 - Updated: 2026-02-11 14:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-54013: interconnect: Fix locking for runpm vs reclaim (bsc#1256280).\n- CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info (bsc#1250388).\n- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).\n- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).\n- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).\n- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).\n- CVE-2025-40261: nvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).\n- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).\n- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).\n- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).\n- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).\n- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).\n- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).\n- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).\n- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).\n- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).\n- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).\n- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).\n- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).\n- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).\n- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).\n- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).\n- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).\n- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).\n- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).\n- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).\n- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).\n- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).\n- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).\n- CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind (bsc#1255488).\n- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).\n- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).\n- CVE-2025-68363: bpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu (bsc#1255552).\n- CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use (bsc#1255548).\n- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).\n- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).\n- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).\n- CVE-2025-68379: RDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure (bsc#1255695).\n- CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname() (bsc#1255568).\n- CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in mi_format_new (bsc#1255539).\n- CVE-2025-68733: smack: fix bug: unprivileged task can create labels (bsc#1255615).\n- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).\n- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).\n- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).\n- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).\n- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).\n- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).\n- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).\n- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).\n- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).\n- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).\n- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).\n- CVE-2025-68803: nfsd: set security label during create operations (bsc#1256770).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).\n- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).\n- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).\n- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).\n- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).\n- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).\n- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).\n- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).\n- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).\n- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).\n- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).\n- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).\n- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).\n- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).\n- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).\n- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).\n- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).\n- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).\n- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).\n- CVE-2025-71137: octeontx2-pf: fix \u0027UBSAN: shift-out-of-bounds error\u0027 (bsc#1256760).\n- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).\n- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).\n- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).\n- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).\n- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).\n- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).\n- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).\n- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).\n- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).\n- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).\n- CVE-2026-22996: net/mlx5e: Don\u0027t store mlx5e_priv in mlx5e_dev devlink priv.\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).\n- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).\n- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).\n- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).\n\nThe following non security issues were fixed:\n\n- ALSA: ctxfi: Fix potential OOB access in audio mixer handling (stable-fixes).\n- ALSA: scarlett2: Fix buffer overflow in config retrieval (git-fixes).\n- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).\n- ALSA: usb: Increase volume range that triggers a warning (git-fixes).\n- ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 (stable-fixes).\n- ASoC: codecs: wsa881x: Drop unused version readout (stable-fixes).\n- ASoC: codecs: wsa881x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa883x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa884x: fix codec initialisation (git-fixes).\n- ASoC: fsl_sai: Add missing registers to cache default (stable-fixes).\n- ASoC: fsl: imx-card: Do not force slot width to sample width (git-fixes).\n- ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion (git-fixes).\n- ASoC: tlv320adcx140: fix null pointer (git-fixes).\n- ASoC: tlv320adcx140: fix word length (git-fixes).\n- ata: libata: Add cpr_log to ata_dev_print_features() early return (git-fixes).\n- Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work (git-fixes).\n- Bluetooth: MGMT: Fix memory leak in set_ssp_complete (git-fixes).\n- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).\n- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).\n- bs-upload-kernel: Fix cve branch uploads.\n- btrfs: do not strictly require dirty metadata threshold for metadata writepages (stable-fixes).\n- can: ctucanfd: fix SSP_SRC in cases when bit-rate is higher than 1 MBit (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: etas_es58x: allow partial RX URB allocation to succeed (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): fix error message (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error (git-fixes).\n- can: j1939: make j1939_session_activate() fail if device is no longer registered (stable-fixes).\n- can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak (git-fixes).\n- cifs: add new field to track the last access time of cfid (git-fixes).\n- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).\n- cifs: avoid redundant calls to disable multichannel (git-fixes).\n- cifs: cifs_pick_channel should try selecting active channels (git-fixes).\n- cifs: deal with the channel loading lag while picking channels (git-fixes).\n- cifs: dns resolution is needed only for primary channel (git-fixes).\n- cifs: do not disable interface polling on failure (git-fixes).\n- cifs: do not search for channel if server is terminating (git-fixes).\n- cifs: fix a pending undercount of srv_count (git-fixes).\n- cifs: Fix copy offload to flush destination region (bsc#1252511).\n- cifs: Fix flushing, invalidation and file size with copy_file_range() (bsc#1252511).\n- cifs: fix lock ordering while disabling multichannel (git-fixes).\n- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).\n- cifs: fix use after free for iface while disabling secondary channels (git-fixes).\n- cifs: handle servers that still advertise multichannel after disabling (git-fixes).\n- cifs: handle when server starts supporting multichannel (git-fixes).\n- cifs: handle when server stops supporting multichannel (git-fixes).\n- cifs: make cifs_chan_update_iface() a void function (git-fixes).\n- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).\n- cifs: make sure that channel scaling is done only once (git-fixes).\n- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).\n- cifs: reset connections for all channels when reconnect requested (git-fixes).\n- cifs: reset iface weights when we cannot find a candidate (git-fixes).\n- cifs: serialize other channels when query server interfaces is pending (git-fixes).\n- cifs: update dstaddr whenever channel iface is updated (git-fixes).\n- comedi: dmm32at: serialize use of paged registers (git-fixes).\n- comedi: fix divide-by-zero in comedi_buf_munge() (stable-fixes).\n- comedi: Fix getting range information for subdevices 16 to 255 (git-fixes).\n- cpuset: fix warning when disabling remote partition (bsc#1256794).\n- crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (git-fixes).\n- dmaengine: apple-admac: Add \u0027apple,t8103-admac\u0027 compatible (git-fixes).\n- dmaengine: at_hdmac: fix device leak on of_dma_xlate() (git-fixes).\n- dmaengine: bcm-sba-raid: fix device leak on probe (git-fixes).\n- dmaengine: dw: dmamux: fix OF node leak on route allocation failure (git-fixes).\n- dmaengine: idxd: fix device leaks on compat bind and unbind (git-fixes).\n- dmaengine: lpc18xx-dmamux: fix device leak on route allocation (git-fixes).\n- dmaengine: omap-dma: fix dma_pool resource leak in error paths (git-fixes).\n- dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() (git-fixes).\n- dmaengine: sh: rz-dmac: Fix rz_dmac_terminate_all() (git-fixes).\n- dmaengine: tegra-adma: Fix use-after-free (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on dra7x route allocation (git-fixes).\n- dmaengine: ti: k3-udma: fix device leak on udma lookup (git-fixes).\n- dmaengine: xilinx_dma: Fix uninitialized addr_width when \u0027xlnx,addrwidth\u0027 property is missing (git-fixes).\n- dmaengine: xilinx: xdma: Fix regmap max_register (git-fixes).\n- dpll: fix device-id-get and pin-id-get to return errors properly (git-fixes).\n- dpll: fix return value check for kmemdup (git-fixes).\n- dpll: indent DPLL option type by a tab (git-fixes).\n- dpll: Prevent duplicate registrations (git-fixes).\n- dpll: spec: add missing module-name and clock-id to pin-get reply (git-fixes).\n- drm/amd: Clean up kfd node on surprise disconnect (stable-fixes).\n- drm/amd/display: Apply e4479aecf658 to dml (stable-fixes).\n- drm/amd/display: Bump the HDMI clock to 340MHz (stable-fixes).\n- drm/amd/display: Fix DP no audio issue (stable-fixes).\n- drm/amd/display: Initialise backlight level values from hw (git-fixes).\n- drm/amd/display: Respect user\u0027s CONFIG_FRAME_WARN more for dml files (stable-fixes).\n- drm/amd/display: shrink struct members (stable-fixes).\n- drm/amd/pm: Don\u0027t clear SI SMC table when setting power limit (git-fixes).\n- drm/amd/pm: fix race in power state check before mutex lock (git-fixes).\n- drm/amd/pm: fix smu overdrive data type wrong issue on smu 14.0.2 (git-fixes).\n- drm/amd/pm: Workaround SI powertune issue on Radeon 430 (v2) (git-fixes).\n- drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule() (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove (git-fixes).\n- drm/amdgpu: Fix query for VPE block_type and ip_count (stable-fixes).\n- drm/amdgpu: remove frame cntl for gfx v12 (stable-fixes).\n- drm/amdkfd: fix a memory leak in device_queue_manager_init() (git-fixes).\n- drm/amdkfd: Fix improper NULL termination of queue restore SMI event string (stable-fixes).\n- drm/imagination: Wait for FW trace update command completion (git-fixes).\n- drm/imx/tve: fix probe device leak (git-fixes).\n- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).\n- drm/nouveau: add missing DCB connector types (git-fixes).\n- drm/nouveau: implement missing DCB connector types; gracefully handle unknown connectors (git-fixes).\n- drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit) (stable-fixes).\n- drm/nouveau/disp/nv50-: Set lock_core in curs507a_prepare (git-fixes).\n- drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel (git-fixes).\n- drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] (stable-fixes).\n- drm/vmwgfx: Fix an error return check in vmw_compat_shader_add() (git-fixes).\n- drm/vmwgfx: Merge vmw_bo_release and vmw_bo_free functions (git-fixes).\n- exfat: check return value of sb_min_blocksize in exfat_read_boot_sector (git-fixes).\n- exfat: fix remount failure in different process environments (git-fixes).\n- gpio: omap: do not register driver in probe() (git-fixes).\n- gpio: pca953x: Add support for level-triggered interrupts (stable-fixes).\n- gpio: pca953x: fix wrong error probe return value (git-fixes).\n- gpio: pca953x: handle short interrupt pulses on PCAL devices (git-fixes).\n- gpio: pca953x: Utilise dev_err_probe() where it makes sense (stable-fixes).\n- gpio: pca953x: Utilise temporary variable for struct device (stable-fixes).\n- gpio: rockchip: Stop calling pinctrl for set_direction (git-fixes).\n- HID: usbhid: paper over wrong bNumDescriptor field (stable-fixes).\n- ice: use netif_get_num_default_rss_queues() (bsc#1247712).\n- iio: accel: iis328dq: fix gain values (git-fixes).\n- iio: adc: ad7280a: handle spi_setup() errors in probe() (git-fixes).\n- iio: adc: ad9467: fix ad9434 vref mask (git-fixes).\n- iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver (git-fixes).\n- iio: dac: ad5686: add AD5695R to ad5686_chip_info_tbl (git-fixes).\n- iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection (git-fixes).\n- Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA (stable-fixes).\n- Input: i8042 - add quirks for MECHREVO Wujie 15X Pro (stable-fixes).\n- intel_th: fix device leak on output open() (git-fixes).\n- leds: led-class: Only Add LED to leds_list when it is fully ready (git-fixes).\n- lib/crypto: aes: Fix missing MMU protection for AES S-box (git-fixes).\n- mei: me: add nova lake point S DID (stable-fixes).\n- mei: me: add wildcat lake P DID (stable-fixes).\n- mISDN: annotate data-race around dev-\u003ework (git-fixes).\n- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1253087).\n- mmc: rtsx_pci_sdmmc: implement sdmmc_card_busy function (git-fixes).\n- mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode (git-fixes).\n- net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts (git-fixes).\n- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (git-fixes).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (git-fixes).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (git-fixes).\n- net: tcp: allow zero-window ACK update the window (bsc#1254767).\n- net: usb: dm9601: remove broken SR9700 support (git-fixes).\n- net: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path (git-fixes).\n- nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame() (git-fixes).\n- nfc: nci: Fix race between rfkill and nci_unregister_device() (git-fixes).\n- NFS: Fix up the automount fs_context to use the correct cred (git-fixes).\n- nfsd: Drop the client reference in client_states_open() (git-fixes).\n- NFSD: Fix permission check for read access to executable-only files (git-fixes).\n- NFSD: use correct reservation type in nfsd4_scsi_fence_client (git-fixes).\n- NFSD/blocklayout: Fix minlength check in proc_layoutget (git-fixes).\n- NFSv4: ensure the open stateid seqid doesn\u0027t go backwards (git-fixes).\n- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).\n- nvmet-auth: update sc_c in host response (git-fixes).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- of: fix reference count leak in of_alias_scan() (git-fixes).\n- of: platform: Use default match table for /firmware (git-fixes).\n- phy: freescale: imx8m-pcie: assert phy reset during power on (stable-fixes).\n- phy: rockchip: inno-usb2: fix communication disruption in gadget mode (git-fixes).\n- phy: rockchip: inno-usb2: fix disconnection in gadget mode (git-fixes).\n- phy: stm32-usphyc: Fix off by one in probe() (git-fixes).\n- phy: tegra: xusb: Explicitly configure HS_DISCON_LEVEL to 0x7 (git-fixes).\n- platform/x86: hp-bioscfg: Fix automatic module loading (git-fixes).\n- platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro (git-fixes).\n- platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names (git-fixes).\n- platform/x86/amd: Fix memory leak in wbrf_record() (git-fixes).\n- pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() (git-fixes).\n- powercap: fix race condition in register_control_type() (stable-fixes).\n- powercap: fix sscanf() error return value handling (stable-fixes).\n- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).\n- RDMA/mana_ib: Access remote atomic for MRs (git-fixes).\n- RDMA/mana_ib: add additional port counters (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: add support of multiple ports (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (git-fixes).\n- regmap: Fix race condition in hwspinlock irqsave routine (git-fixes).\n- sched: Increase sched_tick_remote timeout (bsc#1254510).\n- sched/rt: Skip group schedulable check with rt_group_sched=0 (bsc#1256568).\n- scripts: obsapi: Support URL trailing / in oscrc.\n- scripts: teaapi: Add paging.\n- scripts: uploader: Fix no change condition for _maintainership.json.\n- scripts: uploader: Handle missing upstream in is_pr_open.\n- scripts/python/git_sort/git_sort.yaml: add cifs for-next repository.\n- scrits: teaapi: Add list_repos.\n- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256861).\n- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256861).\n- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256863).\n- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256863).\n- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256863).\n- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256863).\n- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256863).\n- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256863).\n- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256863).\n- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256863).\n- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256863).\n- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256863).\n- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256863).\n- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256863).\n- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).\n- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).\n- selftests/bpf: Fix flaky bpf_cookie selftest (git-fixes).\n- serial: 8250_pci: Fix broken RS485 for F81504/508/512 (git-fixes).\n- slimbus: core: fix device reference leak on report present (git-fixes).\n- slimbus: core: fix OF node leak on registration failure (git-fixes).\n- slimbus: core: fix of_slim_get_device() kernel doc (git-fixes).\n- slimbus: core: fix runtime PM imbalance on report present (git-fixes).\n- smb: change return type of cached_dir_lease_break() to bool (git-fixes).\n- smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid (git-fixes).\n- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).\n- smb: client: fix warning when reconnecting channel (git-fixes).\n- smb: client: introduce close_cached_dir_locked() (git-fixes).\n- smb: client: remove unused fid_lock (git-fixes).\n- smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-fixes).\n- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748).\n- smb: client: update cfid-\u003elast_access_time in open_cached_dir_by_dentry() (git-fixes).\n- smb: improve directory cache reuse for readdir operations (bsc#1252712).\n- smb3: add missing null server pointer check (git-fixes).\n- spi: spi-sprd-adi: Fix double free in probe error path (git-fixes).\n- spi: sprd-adi: switch to use spi_alloc_host() (stable-fixes).\n- spi: sprd: adi: Use devm_register_restart_handler() (stable-fixes).\n- svcrdma: return 0 on success from svc_rdma_copy_inline_range (git-fixes).\n- uacce: ensure safe queue release with state management (git-fixes).\n- uacce: fix cdev handling in the cleanup path (git-fixes).\n- uacce: fix isolate sysfs check condition (git-fixes).\n- uacce: implement mremap in uacce_vm_ops to return -EPERM (git-fixes).\n- usb: core: add USB_QUIRK_NO_BOS for devices that hang on BOS descriptor (stable-fixes).\n- usb: dwc3: Check for USB4 IP_NAME (stable-fixes).\n- USB: OHCI/UHCI: Add soft dependencies on ehci_platform (stable-fixes).\n- USB: serial: ftdi_sio: add support for PICAXE AXE027 cable (stable-fixes).\n- USB: serial: option: add Telit LE910 MBIM composition (stable-fixes).\n- usbnet: limit max_mtu based on device\u0027s hard_mtu (git-fixes).\n- w1: fix redundant counter decrement in w1_attach_slave_device() (git-fixes).\n- w1: therm: Fix off-by-one buffer overflow in alarms_store (git-fixes).\n- wifi: ath10k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: ath12k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: mac80211: correctly decode TTLM with default link map (git-fixes).\n- wifi: mac80211: don\u0027t perform DA check on S1G beacon (git-fixes).\n- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).\n- wifi: rsi: Fix memory corruption due to not set vif driver data size (git-fixes).\n- x86: make page fault handling disable interrupts properly (git-fixes).\n- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).\n- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).\n- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).\n- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).\n- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).\n- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).\n- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528).\n- x86/microcode/AMD: Fix __apply_microcode_amd()\u0027s return value (bsc#1256528).\n- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).\n- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).\n- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).\n- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-447,SUSE-SLE-Module-Basesystem-15-SP7-2026-447,SUSE-SLE-Module-Development-Tools-15-SP7-2026-447,SUSE-SLE-Module-Legacy-15-SP7-2026-447,SUSE-SLE-Module-Live-Patching-15-SP7-2026-447,SUSE-SLE-Product-HA-15-SP7-2026-447,SUSE-SLE-Product-WE-15-SP7-2026-447",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0447-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0447-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260447-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0447-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205462",
"url": "https://bugzilla.suse.com/1205462"
},
{
"category": "self",
"summary": "SUSE Bug 1214285",
"url": "https://bugzilla.suse.com/1214285"
},
{
"category": "self",
"summary": "SUSE Bug 1215199",
"url": "https://bugzilla.suse.com/1215199"
},
{
"category": "self",
"summary": "SUSE Bug 1223800",
"url": "https://bugzilla.suse.com/1223800"
},
{
"category": "self",
"summary": "SUSE Bug 1228490",
"url": "https://bugzilla.suse.com/1228490"
},
{
"category": "self",
"summary": "SUSE Bug 1233563",
"url": "https://bugzilla.suse.com/1233563"
},
{
"category": "self",
"summary": "SUSE Bug 1234842",
"url": "https://bugzilla.suse.com/1234842"
},
{
"category": "self",
"summary": "SUSE Bug 1235566",
"url": "https://bugzilla.suse.com/1235566"
},
{
"category": "self",
"summary": "SUSE Bug 1241437",
"url": "https://bugzilla.suse.com/1241437"
},
{
"category": "self",
"summary": "SUSE Bug 1242505",
"url": "https://bugzilla.suse.com/1242505"
},
{
"category": "self",
"summary": "SUSE Bug 1242909",
"url": "https://bugzilla.suse.com/1242909"
},
{
"category": "self",
"summary": "SUSE Bug 1243662",
"url": "https://bugzilla.suse.com/1243662"
},
{
"category": "self",
"summary": "SUSE Bug 1243677",
"url": "https://bugzilla.suse.com/1243677"
},
{
"category": "self",
"summary": "SUSE Bug 1243678",
"url": "https://bugzilla.suse.com/1243678"
},
{
"category": "self",
"summary": "SUSE Bug 1245538",
"url": "https://bugzilla.suse.com/1245538"
},
{
"category": "self",
"summary": "SUSE Bug 1246022",
"url": "https://bugzilla.suse.com/1246022"
},
{
"category": "self",
"summary": "SUSE Bug 1246184",
"url": "https://bugzilla.suse.com/1246184"
},
{
"category": "self",
"summary": "SUSE Bug 1246447",
"url": "https://bugzilla.suse.com/1246447"
},
{
"category": "self",
"summary": "SUSE Bug 1247030",
"url": "https://bugzilla.suse.com/1247030"
},
{
"category": "self",
"summary": "SUSE Bug 1247712",
"url": "https://bugzilla.suse.com/1247712"
},
{
"category": "self",
"summary": "SUSE Bug 1248211",
"url": "https://bugzilla.suse.com/1248211"
},
{
"category": "self",
"summary": "SUSE Bug 1249307",
"url": "https://bugzilla.suse.com/1249307"
},
{
"category": "self",
"summary": "SUSE Bug 1249904",
"url": "https://bugzilla.suse.com/1249904"
},
{
"category": "self",
"summary": "SUSE Bug 1250032",
"url": "https://bugzilla.suse.com/1250032"
},
{
"category": "self",
"summary": "SUSE Bug 1250082",
"url": "https://bugzilla.suse.com/1250082"
},
{
"category": "self",
"summary": "SUSE Bug 1250388",
"url": "https://bugzilla.suse.com/1250388"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250748",
"url": "https://bugzilla.suse.com/1250748"
},
{
"category": "self",
"summary": "SUSE Bug 1252511",
"url": "https://bugzilla.suse.com/1252511"
},
{
"category": "self",
"summary": "SUSE Bug 1252712",
"url": "https://bugzilla.suse.com/1252712"
},
{
"category": "self",
"summary": "SUSE Bug 1252891",
"url": "https://bugzilla.suse.com/1252891"
},
{
"category": "self",
"summary": "SUSE Bug 1252900",
"url": "https://bugzilla.suse.com/1252900"
},
{
"category": "self",
"summary": "SUSE Bug 1253087",
"url": "https://bugzilla.suse.com/1253087"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253340",
"url": "https://bugzilla.suse.com/1253340"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253471",
"url": "https://bugzilla.suse.com/1253471"
},
{
"category": "self",
"summary": "SUSE Bug 1253739",
"url": "https://bugzilla.suse.com/1253739"
},
{
"category": "self",
"summary": "SUSE Bug 1254244",
"url": "https://bugzilla.suse.com/1254244"
},
{
"category": "self",
"summary": "SUSE Bug 1254447",
"url": "https://bugzilla.suse.com/1254447"
},
{
"category": "self",
"summary": "SUSE Bug 1254465",
"url": "https://bugzilla.suse.com/1254465"
},
{
"category": "self",
"summary": "SUSE Bug 1254510",
"url": "https://bugzilla.suse.com/1254510"
},
{
"category": "self",
"summary": "SUSE Bug 1254624",
"url": "https://bugzilla.suse.com/1254624"
},
{
"category": "self",
"summary": "SUSE Bug 1254767",
"url": "https://bugzilla.suse.com/1254767"
},
{
"category": "self",
"summary": "SUSE Bug 1254835",
"url": "https://bugzilla.suse.com/1254835"
},
{
"category": "self",
"summary": "SUSE Bug 1254839",
"url": "https://bugzilla.suse.com/1254839"
},
{
"category": "self",
"summary": "SUSE Bug 1254842",
"url": "https://bugzilla.suse.com/1254842"
},
{
"category": "self",
"summary": "SUSE Bug 1254845",
"url": "https://bugzilla.suse.com/1254845"
},
{
"category": "self",
"summary": "SUSE Bug 1254852",
"url": "https://bugzilla.suse.com/1254852"
},
{
"category": "self",
"summary": "SUSE Bug 1254871",
"url": "https://bugzilla.suse.com/1254871"
},
{
"category": "self",
"summary": "SUSE Bug 1255102",
"url": "https://bugzilla.suse.com/1255102"
},
{
"category": "self",
"summary": "SUSE Bug 1255120",
"url": "https://bugzilla.suse.com/1255120"
},
{
"category": "self",
"summary": "SUSE Bug 1255128",
"url": "https://bugzilla.suse.com/1255128"
},
{
"category": "self",
"summary": "SUSE Bug 1255138",
"url": "https://bugzilla.suse.com/1255138"
},
{
"category": "self",
"summary": "SUSE Bug 1255140",
"url": "https://bugzilla.suse.com/1255140"
},
{
"category": "self",
"summary": "SUSE Bug 1255157",
"url": "https://bugzilla.suse.com/1255157"
},
{
"category": "self",
"summary": "SUSE Bug 1255164",
"url": "https://bugzilla.suse.com/1255164"
},
{
"category": "self",
"summary": "SUSE Bug 1255172",
"url": "https://bugzilla.suse.com/1255172"
},
{
"category": "self",
"summary": "SUSE Bug 1255216",
"url": "https://bugzilla.suse.com/1255216"
},
{
"category": "self",
"summary": "SUSE Bug 1255226",
"url": "https://bugzilla.suse.com/1255226"
},
{
"category": "self",
"summary": "SUSE Bug 1255241",
"url": "https://bugzilla.suse.com/1255241"
},
{
"category": "self",
"summary": "SUSE Bug 1255255",
"url": "https://bugzilla.suse.com/1255255"
},
{
"category": "self",
"summary": "SUSE Bug 1255260",
"url": "https://bugzilla.suse.com/1255260"
},
{
"category": "self",
"summary": "SUSE Bug 1255261",
"url": "https://bugzilla.suse.com/1255261"
},
{
"category": "self",
"summary": "SUSE Bug 1255266",
"url": "https://bugzilla.suse.com/1255266"
},
{
"category": "self",
"summary": "SUSE Bug 1255268",
"url": "https://bugzilla.suse.com/1255268"
},
{
"category": "self",
"summary": "SUSE Bug 1255269",
"url": "https://bugzilla.suse.com/1255269"
},
{
"category": "self",
"summary": "SUSE Bug 1255327",
"url": "https://bugzilla.suse.com/1255327"
},
{
"category": "self",
"summary": "SUSE Bug 1255346",
"url": "https://bugzilla.suse.com/1255346"
},
{
"category": "self",
"summary": "SUSE Bug 1255377",
"url": "https://bugzilla.suse.com/1255377"
},
{
"category": "self",
"summary": "SUSE Bug 1255401",
"url": "https://bugzilla.suse.com/1255401"
},
{
"category": "self",
"summary": "SUSE Bug 1255403",
"url": "https://bugzilla.suse.com/1255403"
},
{
"category": "self",
"summary": "SUSE Bug 1255417",
"url": "https://bugzilla.suse.com/1255417"
},
{
"category": "self",
"summary": "SUSE Bug 1255482",
"url": "https://bugzilla.suse.com/1255482"
},
{
"category": "self",
"summary": "SUSE Bug 1255488",
"url": "https://bugzilla.suse.com/1255488"
},
{
"category": "self",
"summary": "SUSE Bug 1255537",
"url": "https://bugzilla.suse.com/1255537"
},
{
"category": "self",
"summary": "SUSE Bug 1255539",
"url": "https://bugzilla.suse.com/1255539"
},
{
"category": "self",
"summary": "SUSE Bug 1255544",
"url": "https://bugzilla.suse.com/1255544"
},
{
"category": "self",
"summary": "SUSE Bug 1255547",
"url": "https://bugzilla.suse.com/1255547"
},
{
"category": "self",
"summary": "SUSE Bug 1255548",
"url": "https://bugzilla.suse.com/1255548"
},
{
"category": "self",
"summary": "SUSE Bug 1255552",
"url": "https://bugzilla.suse.com/1255552"
},
{
"category": "self",
"summary": "SUSE Bug 1255568",
"url": "https://bugzilla.suse.com/1255568"
},
{
"category": "self",
"summary": "SUSE Bug 1255569",
"url": "https://bugzilla.suse.com/1255569"
},
{
"category": "self",
"summary": "SUSE Bug 1255615",
"url": "https://bugzilla.suse.com/1255615"
},
{
"category": "self",
"summary": "SUSE Bug 1255622",
"url": "https://bugzilla.suse.com/1255622"
},
{
"category": "self",
"summary": "SUSE Bug 1255695",
"url": "https://bugzilla.suse.com/1255695"
},
{
"category": "self",
"summary": "SUSE Bug 1255930",
"url": "https://bugzilla.suse.com/1255930"
},
{
"category": "self",
"summary": "SUSE Bug 1256280",
"url": "https://bugzilla.suse.com/1256280"
},
{
"category": "self",
"summary": "SUSE Bug 1256528",
"url": "https://bugzilla.suse.com/1256528"
},
{
"category": "self",
"summary": "SUSE Bug 1256568",
"url": "https://bugzilla.suse.com/1256568"
},
{
"category": "self",
"summary": "SUSE Bug 1256579",
"url": "https://bugzilla.suse.com/1256579"
},
{
"category": "self",
"summary": "SUSE Bug 1256582",
"url": "https://bugzilla.suse.com/1256582"
},
{
"category": "self",
"summary": "SUSE Bug 1256584",
"url": "https://bugzilla.suse.com/1256584"
},
{
"category": "self",
"summary": "SUSE Bug 1256586",
"url": "https://bugzilla.suse.com/1256586"
},
{
"category": "self",
"summary": "SUSE Bug 1256591",
"url": "https://bugzilla.suse.com/1256591"
},
{
"category": "self",
"summary": "SUSE Bug 1256592",
"url": "https://bugzilla.suse.com/1256592"
},
{
"category": "self",
"summary": "SUSE Bug 1256593",
"url": "https://bugzilla.suse.com/1256593"
},
{
"category": "self",
"summary": "SUSE Bug 1256594",
"url": "https://bugzilla.suse.com/1256594"
},
{
"category": "self",
"summary": "SUSE Bug 1256597",
"url": "https://bugzilla.suse.com/1256597"
},
{
"category": "self",
"summary": "SUSE Bug 1256605",
"url": "https://bugzilla.suse.com/1256605"
},
{
"category": "self",
"summary": "SUSE Bug 1256606",
"url": "https://bugzilla.suse.com/1256606"
},
{
"category": "self",
"summary": "SUSE Bug 1256607",
"url": "https://bugzilla.suse.com/1256607"
},
{
"category": "self",
"summary": "SUSE Bug 1256608",
"url": "https://bugzilla.suse.com/1256608"
},
{
"category": "self",
"summary": "SUSE Bug 1256609",
"url": "https://bugzilla.suse.com/1256609"
},
{
"category": "self",
"summary": "SUSE Bug 1256610",
"url": "https://bugzilla.suse.com/1256610"
},
{
"category": "self",
"summary": "SUSE Bug 1256611",
"url": "https://bugzilla.suse.com/1256611"
},
{
"category": "self",
"summary": "SUSE Bug 1256612",
"url": "https://bugzilla.suse.com/1256612"
},
{
"category": "self",
"summary": "SUSE Bug 1256613",
"url": "https://bugzilla.suse.com/1256613"
},
{
"category": "self",
"summary": "SUSE Bug 1256616",
"url": "https://bugzilla.suse.com/1256616"
},
{
"category": "self",
"summary": "SUSE Bug 1256617",
"url": "https://bugzilla.suse.com/1256617"
},
{
"category": "self",
"summary": "SUSE Bug 1256619",
"url": "https://bugzilla.suse.com/1256619"
},
{
"category": "self",
"summary": "SUSE Bug 1256622",
"url": "https://bugzilla.suse.com/1256622"
},
{
"category": "self",
"summary": "SUSE Bug 1256623",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "self",
"summary": "SUSE Bug 1256625",
"url": "https://bugzilla.suse.com/1256625"
},
{
"category": "self",
"summary": "SUSE Bug 1256627",
"url": "https://bugzilla.suse.com/1256627"
},
{
"category": "self",
"summary": "SUSE Bug 1256628",
"url": "https://bugzilla.suse.com/1256628"
},
{
"category": "self",
"summary": "SUSE Bug 1256630",
"url": "https://bugzilla.suse.com/1256630"
},
{
"category": "self",
"summary": "SUSE Bug 1256638",
"url": "https://bugzilla.suse.com/1256638"
},
{
"category": "self",
"summary": "SUSE Bug 1256641",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256646",
"url": "https://bugzilla.suse.com/1256646"
},
{
"category": "self",
"summary": "SUSE Bug 1256650",
"url": "https://bugzilla.suse.com/1256650"
},
{
"category": "self",
"summary": "SUSE Bug 1256651",
"url": "https://bugzilla.suse.com/1256651"
},
{
"category": "self",
"summary": "SUSE Bug 1256653",
"url": "https://bugzilla.suse.com/1256653"
},
{
"category": "self",
"summary": "SUSE Bug 1256654",
"url": "https://bugzilla.suse.com/1256654"
},
{
"category": "self",
"summary": "SUSE Bug 1256655",
"url": "https://bugzilla.suse.com/1256655"
},
{
"category": "self",
"summary": "SUSE Bug 1256659",
"url": "https://bugzilla.suse.com/1256659"
},
{
"category": "self",
"summary": "SUSE Bug 1256660",
"url": "https://bugzilla.suse.com/1256660"
},
{
"category": "self",
"summary": "SUSE Bug 1256661",
"url": "https://bugzilla.suse.com/1256661"
},
{
"category": "self",
"summary": "SUSE Bug 1256664",
"url": "https://bugzilla.suse.com/1256664"
},
{
"category": "self",
"summary": "SUSE Bug 1256665",
"url": "https://bugzilla.suse.com/1256665"
},
{
"category": "self",
"summary": "SUSE Bug 1256674",
"url": "https://bugzilla.suse.com/1256674"
},
{
"category": "self",
"summary": "SUSE Bug 1256680",
"url": "https://bugzilla.suse.com/1256680"
},
{
"category": "self",
"summary": "SUSE Bug 1256682",
"url": "https://bugzilla.suse.com/1256682"
},
{
"category": "self",
"summary": "SUSE Bug 1256688",
"url": "https://bugzilla.suse.com/1256688"
},
{
"category": "self",
"summary": "SUSE Bug 1256689",
"url": "https://bugzilla.suse.com/1256689"
},
{
"category": "self",
"summary": "SUSE Bug 1256690",
"url": "https://bugzilla.suse.com/1256690"
},
{
"category": "self",
"summary": "SUSE Bug 1256726",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "self",
"summary": "SUSE Bug 1256728",
"url": "https://bugzilla.suse.com/1256728"
},
{
"category": "self",
"summary": "SUSE Bug 1256730",
"url": "https://bugzilla.suse.com/1256730"
},
{
"category": "self",
"summary": "SUSE Bug 1256733",
"url": "https://bugzilla.suse.com/1256733"
},
{
"category": "self",
"summary": "SUSE Bug 1256737",
"url": "https://bugzilla.suse.com/1256737"
},
{
"category": "self",
"summary": "SUSE Bug 1256741",
"url": "https://bugzilla.suse.com/1256741"
},
{
"category": "self",
"summary": "SUSE Bug 1256742",
"url": "https://bugzilla.suse.com/1256742"
},
{
"category": "self",
"summary": "SUSE Bug 1256744",
"url": "https://bugzilla.suse.com/1256744"
},
{
"category": "self",
"summary": "SUSE Bug 1256748",
"url": "https://bugzilla.suse.com/1256748"
},
{
"category": "self",
"summary": "SUSE Bug 1256749",
"url": "https://bugzilla.suse.com/1256749"
},
{
"category": "self",
"summary": "SUSE Bug 1256752",
"url": "https://bugzilla.suse.com/1256752"
},
{
"category": "self",
"summary": "SUSE Bug 1256754",
"url": "https://bugzilla.suse.com/1256754"
},
{
"category": "self",
"summary": "SUSE Bug 1256756",
"url": "https://bugzilla.suse.com/1256756"
},
{
"category": "self",
"summary": "SUSE Bug 1256757",
"url": "https://bugzilla.suse.com/1256757"
},
{
"category": "self",
"summary": "SUSE Bug 1256759",
"url": "https://bugzilla.suse.com/1256759"
},
{
"category": "self",
"summary": "SUSE Bug 1256760",
"url": "https://bugzilla.suse.com/1256760"
},
{
"category": "self",
"summary": "SUSE Bug 1256761",
"url": "https://bugzilla.suse.com/1256761"
},
{
"category": "self",
"summary": "SUSE Bug 1256763",
"url": "https://bugzilla.suse.com/1256763"
},
{
"category": "self",
"summary": "SUSE Bug 1256770",
"url": "https://bugzilla.suse.com/1256770"
},
{
"category": "self",
"summary": "SUSE Bug 1256773",
"url": "https://bugzilla.suse.com/1256773"
},
{
"category": "self",
"summary": "SUSE Bug 1256774",
"url": "https://bugzilla.suse.com/1256774"
},
{
"category": "self",
"summary": "SUSE Bug 1256777",
"url": "https://bugzilla.suse.com/1256777"
},
{
"category": "self",
"summary": "SUSE Bug 1256779",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "self",
"summary": "SUSE Bug 1256781",
"url": "https://bugzilla.suse.com/1256781"
},
{
"category": "self",
"summary": "SUSE Bug 1256785",
"url": "https://bugzilla.suse.com/1256785"
},
{
"category": "self",
"summary": "SUSE Bug 1256792",
"url": "https://bugzilla.suse.com/1256792"
},
{
"category": "self",
"summary": "SUSE Bug 1256794",
"url": "https://bugzilla.suse.com/1256794"
},
{
"category": "self",
"summary": "SUSE Bug 1256861",
"url": "https://bugzilla.suse.com/1256861"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257035",
"url": "https://bugzilla.suse.com/1257035"
},
{
"category": "self",
"summary": "SUSE Bug 1257053",
"url": "https://bugzilla.suse.com/1257053"
},
{
"category": "self",
"summary": "SUSE Bug 1257154",
"url": "https://bugzilla.suse.com/1257154"
},
{
"category": "self",
"summary": "SUSE Bug 1257155",
"url": "https://bugzilla.suse.com/1257155"
},
{
"category": "self",
"summary": "SUSE Bug 1257158",
"url": "https://bugzilla.suse.com/1257158"
},
{
"category": "self",
"summary": "SUSE Bug 1257163",
"url": "https://bugzilla.suse.com/1257163"
},
{
"category": "self",
"summary": "SUSE Bug 1257164",
"url": "https://bugzilla.suse.com/1257164"
},
{
"category": "self",
"summary": "SUSE Bug 1257167",
"url": "https://bugzilla.suse.com/1257167"
},
{
"category": "self",
"summary": "SUSE Bug 1257168",
"url": "https://bugzilla.suse.com/1257168"
},
{
"category": "self",
"summary": "SUSE Bug 1257180",
"url": "https://bugzilla.suse.com/1257180"
},
{
"category": "self",
"summary": "SUSE Bug 1257202",
"url": "https://bugzilla.suse.com/1257202"
},
{
"category": "self",
"summary": "SUSE Bug 1257204",
"url": "https://bugzilla.suse.com/1257204"
},
{
"category": "self",
"summary": "SUSE Bug 1257207",
"url": "https://bugzilla.suse.com/1257207"
},
{
"category": "self",
"summary": "SUSE Bug 1257208",
"url": "https://bugzilla.suse.com/1257208"
},
{
"category": "self",
"summary": "SUSE Bug 1257215",
"url": "https://bugzilla.suse.com/1257215"
},
{
"category": "self",
"summary": "SUSE Bug 1257217",
"url": "https://bugzilla.suse.com/1257217"
},
{
"category": "self",
"summary": "SUSE Bug 1257218",
"url": "https://bugzilla.suse.com/1257218"
},
{
"category": "self",
"summary": "SUSE Bug 1257220",
"url": "https://bugzilla.suse.com/1257220"
},
{
"category": "self",
"summary": "SUSE Bug 1257221",
"url": "https://bugzilla.suse.com/1257221"
},
{
"category": "self",
"summary": "SUSE Bug 1257227",
"url": "https://bugzilla.suse.com/1257227"
},
{
"category": "self",
"summary": "SUSE Bug 1257232",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "self",
"summary": "SUSE Bug 1257234",
"url": "https://bugzilla.suse.com/1257234"
},
{
"category": "self",
"summary": "SUSE Bug 1257236",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "self",
"summary": "SUSE Bug 1257245",
"url": "https://bugzilla.suse.com/1257245"
},
{
"category": "self",
"summary": "SUSE Bug 1257277",
"url": "https://bugzilla.suse.com/1257277"
},
{
"category": "self",
"summary": "SUSE Bug 1257282",
"url": "https://bugzilla.suse.com/1257282"
},
{
"category": "self",
"summary": "SUSE Bug 1257296",
"url": "https://bugzilla.suse.com/1257296"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257603",
"url": "https://bugzilla.suse.com/1257603"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53714 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54013 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27005 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42103 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53149 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56721 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37744 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37751 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38209 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38243 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38322 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38539 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39689 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39689/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39829 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39836 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39880 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40106 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40136 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40238 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40254 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40257 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40259 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40264 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40328 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40350 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40355 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68174 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68215 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68227 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68241 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68245 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68254 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68284 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68285 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68296 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68297 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68301 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68320 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68325 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68327 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68365 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68366 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68367 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68372 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68733 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68764 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68768 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68770 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68771 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68773 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68775 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68776 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68777 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68783 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68783/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68789 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68797 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68798 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68800 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68801 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68802 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68803 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68804 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68808 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68814 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68815 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68816 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68820 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71076 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71077 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71078 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71089 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71091 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71094 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71095 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71096 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71100 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71108 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71112 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71114 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71136 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71137 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71138 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71143 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71145 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71147 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71163 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22976 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22977 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22978 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22984 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22985 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22988 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22990 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22991 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22991/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22992 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22993 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22996 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22997 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23005 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23006 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23011 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23011/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-02-11T14:05:07Z",
"generator": {
"date": "2026-02-11T14:05:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0447-1",
"initial_release_date": "2026-02-11T14:05:07Z",
"revision_history": [
{
"date": "2026-02-11T14:05:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-altera-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-amd-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-apm-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-apple-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-arm-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-lg-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150700.53.31.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.31.1.aarch64",
"product_id": "kernel-syms-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.31.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150700.53.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-devel-6.4.0-150700.53.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-docs-6.4.0-150700.53.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150700.53.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-macros-6.4.0-150700.53.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-source-6.4.0-150700.53.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150700.53.31.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150700.53.31.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150700.53.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-syms-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.31.1.150700.17.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.31.1.x86_64",
"product_id": "kernel-syms-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150700.53.31.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150700.53.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150700.53.31.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150700.53.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150700.53.31.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150700.53.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150700.53.31.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150700.53.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150700.53.31.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150700.53.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53714"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/stm: ltdc: fix late dereference check\n\nIn ltdc_crtc_set_crc_source(), struct drm_crtc was dereferenced in a\ncontainer_of() before the pointer check. This could cause a kernel panic.\n\nFix this smatch warning:\ndrivers/gpu/drm/stm/ltdc.c:1124 ltdc_crtc_set_crc_source() warn: variable dereferenced before check \u0027crtc\u0027 (see line 1119)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53714",
"url": "https://www.suse.com/security/cve/CVE-2023-53714"
},
{
"category": "external",
"summary": "SUSE Bug 1254465 for CVE-2023-53714",
"url": "https://bugzilla.suse.com/1254465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-53714"
},
{
"cve": "CVE-2023-54013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54013"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: Fix locking for runpm vs reclaim\n\nFor cases where icc_bw_set() can be called in callbaths that could\ndeadlock against shrinker/reclaim, such as runpm resume, we need to\ndecouple the icc locking. Introduce a new icc_bw_lock for cases where\nwe need to serialize bw aggregation and update to decouple that from\npaths that require memory allocation such as node/link creation/\ndestruction.\n\nFixes this lockdep splat:\n\n ======================================================\n WARNING: possible circular locking dependency detected\n 6.2.0-rc8-debug+ #554 Not tainted\n ------------------------------------------------------\n ring0/132 is trying to acquire lock:\n ffffff80871916d0 (\u0026gmu-\u003elock){+.+.}-{3:3}, at: a6xx_pm_resume+0xf0/0x234\n\n but task is already holding lock:\n ffffffdb5aee57e8 (dma_fence_map){++++}-{0:0}, at: msm_job_run+0x68/0x150\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #4 (dma_fence_map){++++}-{0:0}:\n __dma_fence_might_wait+0x74/0xc0\n dma_resv_lockdep+0x1f4/0x2f4\n do_one_initcall+0x104/0x2bc\n kernel_init_freeable+0x344/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #3 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}:\n fs_reclaim_acquire+0x80/0xa8\n slab_pre_alloc_hook.constprop.0+0x40/0x25c\n __kmem_cache_alloc_node+0x60/0x1cc\n __kmalloc+0xd8/0x100\n topology_parse_cpu_capacity+0x8c/0x178\n get_cpu_for_node+0x88/0xc4\n parse_cluster+0x1b0/0x28c\n parse_cluster+0x8c/0x28c\n init_cpu_topology+0x168/0x188\n smp_prepare_cpus+0x24/0xf8\n kernel_init_freeable+0x18c/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #2 (fs_reclaim){+.+.}-{0:0}:\n __fs_reclaim_acquire+0x3c/0x48\n fs_reclaim_acquire+0x54/0xa8\n slab_pre_alloc_hook.constprop.0+0x40/0x25c\n __kmem_cache_alloc_node+0x60/0x1cc\n __kmalloc+0xd8/0x100\n kzalloc.constprop.0+0x14/0x20\n icc_node_create_nolock+0x4c/0xc4\n icc_node_create+0x38/0x58\n qcom_icc_rpmh_probe+0x1b8/0x248\n platform_probe+0x70/0xc4\n really_probe+0x158/0x290\n __driver_probe_device+0xc8/0xe0\n driver_probe_device+0x44/0x100\n __driver_attach+0xf8/0x108\n bus_for_each_dev+0x78/0xc4\n driver_attach+0x2c/0x38\n bus_add_driver+0xd0/0x1d8\n driver_register+0xbc/0xf8\n __platform_driver_register+0x30/0x3c\n qnoc_driver_init+0x24/0x30\n do_one_initcall+0x104/0x2bc\n kernel_init_freeable+0x344/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #1 (icc_lock){+.+.}-{3:3}:\n __mutex_lock+0xcc/0x3c8\n mutex_lock_nested+0x30/0x44\n icc_set_bw+0x88/0x2b4\n _set_opp_bw+0x8c/0xd8\n _set_opp+0x19c/0x300\n dev_pm_opp_set_opp+0x84/0x94\n a6xx_gmu_resume+0x18c/0x804\n a6xx_pm_resume+0xf8/0x234\n adreno_runtime_resume+0x2c/0x38\n pm_generic_runtime_resume+0x30/0x44\n __rpm_callback+0x15c/0x174\n rpm_callback+0x78/0x7c\n rpm_resume+0x318/0x524\n __pm_runtime_resume+0x78/0xbc\n adreno_load_gpu+0xc4/0x17c\n msm_open+0x50/0x120\n drm_file_alloc+0x17c/0x228\n drm_open_helper+0x74/0x118\n drm_open+0xa0/0x144\n drm_stub_open+0xd4/0xe4\n chrdev_open+0x1b8/0x1e4\n do_dentry_open+0x2f8/0x38c\n vfs_open+0x34/0x40\n path_openat+0x64c/0x7b4\n do_filp_open+0x54/0xc4\n do_sys_openat2+0x9c/0x100\n do_sys_open+0x50/0x7c\n __arm64_sys_openat+0x28/0x34\n invoke_syscall+0x8c/0x128\n el0_svc_common.constprop.0+0xa0/0x11c\n do_el0_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54013",
"url": "https://www.suse.com/security/cve/CVE-2023-54013"
},
{
"category": "external",
"summary": "SUSE Bug 1256280 for CVE-2023-54013",
"url": "https://bugzilla.suse.com/1256280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-54013"
},
{
"cve": "CVE-2024-27005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27005"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: Don\u0027t access req_list while it\u0027s being manipulated\n\nThe icc_lock mutex was split into separate icc_lock and icc_bw_lock\nmutexes in [1] to avoid lockdep splats. However, this didn\u0027t adequately\nprotect access to icc_node::req_list.\n\nThe icc_set_bw() function will eventually iterate over req_list while\nonly holding icc_bw_lock, but req_list can be modified while only\nholding icc_lock. This causes races between icc_set_bw(), of_icc_get(),\nand icc_put().\n\nExample A:\n\n CPU0 CPU1\n ---- ----\n icc_set_bw(path_a)\n mutex_lock(\u0026icc_bw_lock);\n icc_put(path_b)\n mutex_lock(\u0026icc_lock);\n aggregate_requests()\n hlist_for_each_entry(r, ...\n hlist_del(...\n \u003cr = invalid pointer\u003e\n\nExample B:\n\n CPU0 CPU1\n ---- ----\n icc_set_bw(path_a)\n mutex_lock(\u0026icc_bw_lock);\n path_b = of_icc_get()\n of_icc_get_by_index()\n mutex_lock(\u0026icc_lock);\n path_find()\n path_init()\n aggregate_requests()\n hlist_for_each_entry(r, ...\n hlist_add_head(...\n \u003cr = invalid pointer\u003e\n\nFix this by ensuring icc_bw_lock is always held before manipulating\nicc_node::req_list. The additional places icc_bw_lock is held don\u0027t\nperform any memory allocations, so we should still be safe from the\noriginal lockdep splats that motivated the separate locks.\n\n[1] commit af42269c3523 (\"interconnect: Fix locking for runpm vs reclaim\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27005",
"url": "https://www.suse.com/security/cve/CVE-2024-27005"
},
{
"category": "external",
"summary": "SUSE Bug 1223800 for CVE-2024-27005",
"url": "https://bugzilla.suse.com/1223800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-27005"
},
{
"cve": "CVE-2024-42103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix adding block group to a reclaim list and the unused list during reclaim\n\nThere is a potential parallel list adding for retrying in\nbtrfs_reclaim_bgs_work and adding to the unused list. Since the block\ngroup is removed from the reclaim list and it is on a relocation work,\nit can be added into the unused list in parallel. When that happens,\nadding it to the reclaim list will corrupt the list head and trigger\nlist corruption like below.\n\nFix it by taking fs_info-\u003eunused_bgs_lock.\n\n [177.504][T2585409] BTRFS error (device nullb1): error relocating ch= unk 2415919104\n [177.514][T2585409] list_del corruption. next-\u003eprev should be ff1100= 0344b119c0, but was ff11000377e87c70. (next=3Dff110002390cd9c0)\n [177.529][T2585409] ------------[ cut here ]------------\n [177.537][T2585409] kernel BUG at lib/list_debug.c:65!\n [177.545][T2585409] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\n [177.555][T2585409] CPU: 9 PID: 2585409 Comm: kworker/u128:2 Tainted: G W 6.10.0-rc5-kts #1\n [177.568][T2585409] Hardware name: Supermicro SYS-520P-WTR/X12SPW-TF, BIOS 1.2 02/14/2022\n [177.579][T2585409] Workqueue: events_unbound btrfs_reclaim_bgs_work[btrfs]\n [177.589][T2585409] RIP: 0010:__list_del_entry_valid_or_report.cold+0x70/0x72\n [177.624][T2585409] RSP: 0018:ff11000377e87a70 EFLAGS: 00010286\n [177.633][T2585409] RAX: 000000000000006d RBX: ff11000344b119c0 RCX:0000000000000000\n [177.644][T2585409] RDX: 000000000000006d RSI: 0000000000000008 RDI:ffe21c006efd0f40\n [177.655][T2585409] RBP: ff110002e0509f78 R08: 0000000000000001 R09:ffe21c006efd0f08\n [177.665][T2585409] R10: ff11000377e87847 R11: 0000000000000000 R12:ff110002390cd9c0\n [177.676][T2585409] R13: ff11000344b119c0 R14: ff110002e0508000 R15:dffffc0000000000\n [177.687][T2585409] FS: 0000000000000000(0000) GS:ff11000fec880000(0000) knlGS:0000000000000000\n [177.700][T2585409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [177.709][T2585409] CR2: 00007f06bc7b1978 CR3: 0000001021e86005 CR4:0000000000771ef0\n [177.720][T2585409] DR0: 0000000000000000 DR1: 0000000000000000 DR2:0000000000000000\n [177.731][T2585409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:0000000000000400\n [177.742][T2585409] PKRU: 55555554\n [177.748][T2585409] Call Trace:\n [177.753][T2585409] \u003cTASK\u003e\n [177.759][T2585409] ? __die_body.cold+0x19/0x27\n [177.766][T2585409] ? die+0x2e/0x50\n [177.772][T2585409] ? do_trap+0x1ea/0x2d0\n [177.779][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.788][T2585409] ? do_error_trap+0xa3/0x160\n [177.795][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.805][T2585409] ? handle_invalid_op+0x2c/0x40\n [177.812][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.820][T2585409] ? exc_invalid_op+0x2d/0x40\n [177.827][T2585409] ? asm_exc_invalid_op+0x1a/0x20\n [177.834][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.843][T2585409] btrfs_delete_unused_bgs+0x3d9/0x14c0 [btrfs]\n\nThere is a similar retry_list code in btrfs_delete_unused_bgs(), but it is\nsafe, AFAICS. Since the block group was in the unused list, the used bytes\nshould be 0 when it was added to the unused list. Then, it checks\nblock_group-\u003e{used,reserved,pinned} are still 0 under the\nblock_group-\u003elock. So, they should be still eligible for the unused list,\nnot the reclaim list.\n\nThe reason it is safe there it\u0027s because because we\u0027re holding\nspace_info-\u003egroups_sem in write mode.\n\nThat means no other task can allocate from the block group, so while we\nare at deleted_unused_bgs() it\u0027s not possible for other tasks to\nallocate and deallocate extents from the block group, so it can\u0027t be\nadded to the unused list or the reclaim list by anyone else.\n\nThe bug can be reproduced by btrfs/166 after a few rounds. In practice\nthis can be hit when relocation cannot find more chunk space and ends\nwith ENOSPC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42103",
"url": "https://www.suse.com/security/cve/CVE-2024-42103"
},
{
"category": "external",
"summary": "SUSE Bug 1228490 for CVE-2024-42103",
"url": "https://bugzilla.suse.com/1228490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-42103"
},
{
"cve": "CVE-2024-53070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\n\nIf the device was already runtime suspended then during system suspend\nwe cannot access the device registers else it will crash.\n\nAlso we cannot access any registers after dwc3_core_exit() on some\nplatforms so move the dwc3_enable_susphy() call to the top.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53070",
"url": "https://www.suse.com/security/cve/CVE-2024-53070"
},
{
"category": "external",
"summary": "SUSE Bug 1233563 for CVE-2024-53070",
"url": "https://bugzilla.suse.com/1233563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-53070"
},
{
"cve": "CVE-2024-53149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: glink: fix off-by-one in connector_status\n\nUCSI connector\u0027s indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS.\nCorrect the condition in the pmic_glink_ucsi_connector_status()\ncallback, fixing Type-C orientation reporting for the third USB-C\nconnector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53149",
"url": "https://www.suse.com/security/cve/CVE-2024-53149"
},
{
"category": "external",
"summary": "SUSE Bug 1234842 for CVE-2024-53149",
"url": "https://bugzilla.suse.com/1234842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2024-53149"
},
{
"cve": "CVE-2024-56721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56721"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/CPU/AMD: Terminate the erratum_1386_microcode array\n\nThe erratum_1386_microcode array requires an empty entry at the end.\nOtherwise x86_match_cpu_with_stepping() will continue iterate the array after\nit ended.\n\nAdd an empty entry to erratum_1386_microcode to its end.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56721",
"url": "https://www.suse.com/security/cve/CVE-2024-56721"
},
{
"category": "external",
"summary": "SUSE Bug 1235566 for CVE-2024-56721",
"url": "https://bugzilla.suse.com/1235566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-56721"
},
{
"cve": "CVE-2025-22047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix __apply_microcode_amd()\u0027s return value\n\nWhen verify_sha256_digest() fails, __apply_microcode_amd() should propagate\nthe failure by returning false (and not -1 which is promoted to true).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22047",
"url": "https://www.suse.com/security/cve/CVE-2025-22047"
},
{
"category": "external",
"summary": "SUSE Bug 1241437 for CVE-2025-22047",
"url": "https://bugzilla.suse.com/1241437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-22047"
},
{
"cve": "CVE-2025-37744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix memory leak in ath12k_pci_remove()\n\nKmemleak reported this error:\n\n unreferenced object 0xffff1c165cec3060 (size 32):\n comm \"insmod\", pid 560, jiffies 4296964570 (age 235.596s)\n backtrace:\n [\u003c000000005434db68\u003e] __kmem_cache_alloc_node+0x1f4/0x2c0\n [\u003c000000001203b155\u003e] kmalloc_trace+0x40/0x88\n [\u003c0000000028adc9c8\u003e] _request_firmware+0xb8/0x608\n [\u003c00000000cad1aef7\u003e] firmware_request_nowarn+0x50/0x80\n [\u003c000000005011a682\u003e] local_pci_probe+0x48/0xd0\n [\u003c00000000077cd295\u003e] pci_device_probe+0xb4/0x200\n [\u003c0000000087184c94\u003e] really_probe+0x150/0x2c0\n\nThe firmware memory was allocated in ath12k_pci_probe(), but not\nfreed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is\nset. So call ath12k_fw_unmap() to free the memory.\n\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37744",
"url": "https://www.suse.com/security/cve/CVE-2025-37744"
},
{
"category": "external",
"summary": "SUSE Bug 1243662 for CVE-2025-37744",
"url": "https://bugzilla.suse.com/1243662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-37744"
},
{
"cve": "CVE-2025-37751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37751"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/cpu: Avoid running off the end of an AMD erratum table\n\nThe NULL array terminator at the end of erratum_1386_microcode was\nremoved during the switch from x86_cpu_desc to x86_cpu_id. This\ncauses readers to run off the end of the array.\n\nReplace the NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37751",
"url": "https://www.suse.com/security/cve/CVE-2025-37751"
},
{
"category": "external",
"summary": "SUSE Bug 1242505 for CVE-2025-37751",
"url": "https://bugzilla.suse.com/1242505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-37751"
},
{
"cve": "CVE-2025-37813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix invalid pointer dereference in Etron workaround\n\nThis check is performed before prepare_transfer() and prepare_ring(), so\nenqueue can already point at the final link TRB of a segment. And indeed\nit will, some 0.4% of times this code is called.\n\nThen enqueue + 1 is an invalid pointer. It will crash the kernel right\naway or load some junk which may look like a link TRB and cause the real\nlink TRB to be replaced with a NOOP. This wouldn\u0027t end well.\n\nUse a functionally equivalent test which doesn\u0027t dereference the pointer\nand always gives correct result.\n\nSomething has crashed my machine twice in recent days while playing with\nan Etron HC, and a control transfer stress test ran for confirmation has\njust crashed it again. The same test passes with this patch applied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37813",
"url": "https://www.suse.com/security/cve/CVE-2025-37813"
},
{
"category": "external",
"summary": "SUSE Bug 1242909 for CVE-2025-37813",
"url": "https://bugzilla.suse.com/1242909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-37813"
},
{
"cve": "CVE-2025-38209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: remove tag set when second admin queue config fails\n\nCommit 104d0e2f6222 (\"nvme-fabrics: reset admin connection for secure\nconcatenation\") modified nvme_tcp_setup_ctrl() to call\nnvme_tcp_configure_admin_queue() twice. The first call prepares for\nDH-CHAP negotitation, and the second call is required for secure\nconcatenation. However, this change triggered BUG KASAN slab-use-after-\nfree in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by\nrepeating the blktests test case nvme/063 a few times [1].\n\nWhen the BUG happens, nvme_tcp_create_ctrl() fails in the call chain\nbelow:\n\nnvme_tcp_create_ctrl()\n nvme_tcp_alloc_ctrl() new=true ... Alloc nvme_tcp_ctrl and admin_tag_set\n nvme_tcp_setup_ctrl() new=true\n nvme_tcp_configure_admin_queue() new=true ... Succeed\n nvme_alloc_admin_tag_set() ... Alloc the tag set for admin_tag_set\n nvme_stop_keep_alive()\n nvme_tcp_teardown_admin_queue() remove=false\n nvme_tcp_configure_admin_queue() new=false\n nvme_tcp_alloc_admin_queue() ... Fail, but do not call nvme_remove_admin_tag_set()\n nvme_uninit_ctrl()\n nvme_put_ctrl() ... Free up the nvme_tcp_ctrl and admin_tag_set\n\nThe first call of nvme_tcp_configure_admin_queue() succeeds with\nnew=true argument. The second call fails with new=false argument. This\nsecond call does not call nvme_remove_admin_tag_set() on failure, due to\nthe new=false argument. Then the admin tag set is not removed. However,\nnvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call\nnvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which\nhas admin_tag_set field. Later on, the timeout handler accesses the\nadmin_tag_set field and causes the BUG KASAN slab-use-after-free.\n\nTo not leave the admin tag set, call nvme_remove_admin_tag_set() when\nthe second nvme_tcp_configure_admin_queue() call fails. Do not return\nfrom nvme_tcp_setup_ctrl() on failure. Instead, jump to \"destroy_admin\"\ngo-to label to call nvme_tcp_teardown_admin_queue() which calls\nnvme_remove_admin_tag_set().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38209",
"url": "https://www.suse.com/security/cve/CVE-2025-38209"
},
{
"category": "external",
"summary": "SUSE Bug 1246022 for CVE-2025-38209",
"url": "https://bugzilla.suse.com/1246022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-38209"
},
{
"cve": "CVE-2025-38243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix invalid inode pointer dereferences during log replay\n\nIn a few places where we call read_one_inode(), if we get a NULL pointer\nwe end up jumping into an error path, or fallthrough in case of\n__add_inode_ref(), where we then do something like this:\n\n iput(\u0026inode-\u003evfs_inode);\n\nwhich results in an invalid inode pointer that triggers an invalid memory\naccess, resulting in a crash.\n\nFix this by making sure we don\u0027t do such dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38243",
"url": "https://www.suse.com/security/cve/CVE-2025-38243"
},
{
"category": "external",
"summary": "SUSE Bug 1246184 for CVE-2025-38243",
"url": "https://bugzilla.suse.com/1246184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-38243"
},
{
"cve": "CVE-2025-38322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38322"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: Fix crash in icl_update_topdown_event()\n\nThe perf_fuzzer found a hard-lockup crash on a RaptorLake machine:\n\n Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000\n CPU: 23 UID: 0 PID: 0 Comm: swapper/23\n Tainted: [W]=WARN\n Hardware name: Dell Inc. Precision 9660/0VJ762\n RIP: 0010:native_read_pmc+0x7/0x40\n Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ...\n RSP: 000:fffb03100273de8 EFLAGS: 00010046\n ....\n Call Trace:\n \u003cTASK\u003e\n icl_update_topdown_event+0x165/0x190\n ? ktime_get+0x38/0xd0\n intel_pmu_read_event+0xf9/0x210\n __perf_event_read+0xf9/0x210\n\nCPUs 16-23 are E-core CPUs that don\u0027t support the perf metrics feature.\nThe icl_update_topdown_event() should not be invoked on these CPUs.\n\nIt\u0027s a regression of commit:\n\n f9bdf1f95339 (\"perf/x86/intel: Avoid disable PMU if !cpuc-\u003eenabled in sample read\")\n\nThe bug introduced by that commit is that the is_topdown_event() function\nis mistakenly used to replace the is_topdown_count() call to check if the\ntopdown functions for the perf metrics feature should be invoked.\n\nFix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38322",
"url": "https://www.suse.com/security/cve/CVE-2025-38322"
},
{
"category": "external",
"summary": "SUSE Bug 1246447 for CVE-2025-38322",
"url": "https://bugzilla.suse.com/1246447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with -\u003equery_interface\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we\u0027re queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38379",
"url": "https://www.suse.com/security/cve/CVE-2025-38379"
},
{
"category": "external",
"summary": "SUSE Bug 1247030 for CVE-2025-38379",
"url": "https://bugzilla.suse.com/1247030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-38379"
},
{
"cve": "CVE-2025-38539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38539"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38539",
"url": "https://www.suse.com/security/cve/CVE-2025-38539"
},
{
"category": "external",
"summary": "SUSE Bug 1248211 for CVE-2025-38539",
"url": "https://bugzilla.suse.com/1248211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-38539"
},
{
"cve": "CVE-2025-39689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39689"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn\u0027t have to differentiate when to free the\niterator\u0027s hash between writers and readers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39689",
"url": "https://www.suse.com/security/cve/CVE-2025-39689"
},
{
"category": "external",
"summary": "SUSE Bug 1249307 for CVE-2025-39689",
"url": "https://bugzilla.suse.com/1249307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix potential warning in trace_printk_seq during ftrace_dump\n\nWhen calling ftrace_dump_one() concurrently with reading trace_pipe,\na WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race\ncondition.\n\nThe issue occurs because:\n\nCPU0 (ftrace_dump) CPU1 (reader)\necho z \u003e /proc/sysrq-trigger\n\n!trace_empty(\u0026iter)\ntrace_iterator_reset(\u0026iter) \u003c- len = size = 0\n cat /sys/kernel/tracing/trace_pipe\ntrace_find_next_entry_inc(\u0026iter)\n __find_next_entry\n ring_buffer_empty_cpu \u003c- all empty\n return NULL\n\ntrace_printk_seq(\u0026iter.seq)\n WARN_ON_ONCE(s-\u003eseq.len \u003e= s-\u003eseq.size)\n\nIn the context between trace_empty() and trace_find_next_entry_inc()\nduring ftrace_dump, the ring buffer data was consumed by other readers.\nThis caused trace_find_next_entry_inc to return NULL, failing to populate\n`iter.seq`. At this point, due to the prior trace_iterator_reset, both\n`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,\nthe WARN_ON_ONCE condition is triggered.\n\nMove the trace_printk_seq() into the if block that checks to make sure the\nreturn value of trace_find_next_entry_inc() is non-NULL in\nftrace_dump_one(), ensuring the \u0027iter.seq\u0027 is properly populated before\nsubsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39813",
"url": "https://www.suse.com/security/cve/CVE-2025-39813"
},
{
"category": "external",
"summary": "SUSE Bug 1250032 for CVE-2025-39813",
"url": "https://bugzilla.suse.com/1250032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39829"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntrace/fgraph: Fix the warning caused by missing unregister notifier\n\nThis warning was triggered during testing on v6.16:\n\nnotifier callback ftrace_suspend_notifier_call already registered\nWARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0\n...\nCall Trace:\n \u003cTASK\u003e\n blocking_notifier_chain_register+0x34/0x60\n register_ftrace_graph+0x330/0x410\n ftrace_profile_write+0x1e9/0x340\n vfs_write+0xf8/0x420\n ? filp_flush+0x8a/0xa0\n ? filp_close+0x1f/0x30\n ? do_dup2+0xaf/0x160\n ksys_write+0x65/0xe0\n do_syscall_64+0xa4/0x260\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen writing to the function_profile_enabled interface, the notifier was\nnot unregistered after start_graph_tracing failed, causing a warning the\nnext time function_profile_enabled was written.\n\nFixed by adding unregister_pm_notifier in the exception path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39829",
"url": "https://www.suse.com/security/cve/CVE-2025-39829"
},
{
"category": "external",
"summary": "SUSE Bug 1250082 for CVE-2025-39829",
"url": "https://bugzilla.suse.com/1250082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39829"
},
{
"cve": "CVE-2025-39836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39836"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: stmm: Fix incorrect buffer allocation method\n\nThe communication buffer allocated by setup_mm_hdr() is later on passed\nto tee_shm_register_kernel_buf(). The latter expects those buffers to be\ncontiguous pages, but setup_mm_hdr() just uses kmalloc(). That can cause\nvarious corruptions or BUGs, specifically since commit 9aec2fb0fd5e\n(\"slab: allocate frozen pages\"), though it was broken before as well.\n\nFix this by using alloc_pages_exact() instead of kmalloc().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39836",
"url": "https://www.suse.com/security/cve/CVE-2025-39836"
},
{
"category": "external",
"summary": "SUSE Bug 1249904 for CVE-2025-39836",
"url": "https://bugzilla.suse.com/1249904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39836"
},
{
"cve": "CVE-2025-39880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix invalid accesses to ceph_connection_v1_info\n\nThere is a place where generic code in messenger.c is reading and\nanother place where it is writing to con-\u003ev1 union member without\nchecking that the union member is active (i.e. msgr1 is in use).\n\nOn 64-bit systems, con-\u003ev1.auth_retry overlaps with con-\u003ev2.out_iter,\nso such a read is almost guaranteed to return a bogus value instead of\n0 when msgr2 is in use. This ends up being fairly benign because the\nside effect is just the invalidation of the authorizer and successive\nfetching of new tickets.\n\ncon-\u003ev1.connect_seq overlaps with con-\u003ev2.conn_bufs and the fact that\nit\u0027s being written to can cause more serious consequences, but luckily\nit\u0027s not something that happens often.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39880",
"url": "https://www.suse.com/security/cve/CVE-2025-39880"
},
{
"category": "external",
"summary": "SUSE Bug 1250388 for CVE-2025-39880",
"url": "https://bugzilla.suse.com/1250388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39880"
},
{
"cve": "CVE-2025-39913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39913"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork.\n\nsyzbot reported the splat below. [0]\n\nThe repro does the following:\n\n 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes)\n 2. Attach the prog to a SOCKMAP\n 3. Add a socket to the SOCKMAP\n 4. Activate fault injection\n 5. Send data less than cork_bytes\n\nAt 5., the data is carried over to the next sendmsg() as it is\nsmaller than the cork_bytes specified by bpf_msg_cork_bytes().\n\nThen, tcp_bpf_send_verdict() tries to allocate psock-\u003ecork to hold\nthe data, but this fails silently due to fault injection + __GFP_NOWARN.\n\nIf the allocation fails, we need to revert the sk-\u003esk_forward_alloc\nchange done by sk_msg_alloc().\n\nLet\u0027s call sk_msg_free() when tcp_bpf_send_verdict fails to allocate\npsock-\u003ecork.\n\nThe \"*copied\" also needs to be updated such that a proper error can\nbe returned to the caller, sendmsg. It fails to allocate psock-\u003ecork.\nNothing has been corked so far, so this patch simply sets \"*copied\"\nto 0.\n\n[0]:\nWARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983\nModules linked in:\nCPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156\nCode: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 \u003c0f\u003e 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc\nRSP: 0018:ffffc90000a08b48 EFLAGS: 00010246\nRAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80\nRDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000\nRBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4\nR10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380\nR13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872\nFS: 00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0\nCall Trace:\n \u003cIRQ\u003e\n __sk_destruct+0x86/0x660 net/core/sock.c:2339\n rcu_do_batch kernel/rcu/tree.c:2605 [inline]\n rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861\n handle_softirqs+0x286/0x870 kernel/softirq.c:579\n __do_softirq kernel/softirq.c:613 [inline]\n invoke_softirq kernel/softirq.c:453 [inline]\n __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680\n irq_exit_rcu+0x9/0x30 kernel/softirq.c:696\n instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]\n sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39913",
"url": "https://www.suse.com/security/cve/CVE-2025-39913"
},
{
"category": "external",
"summary": "SUSE Bug 1250705 for CVE-2025-39913",
"url": "https://bugzilla.suse.com/1250705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-39913"
},
{
"cve": "CVE-2025-40097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix missing pointer check in hda_component_manager_init function\n\nThe __component_match_add function may assign the \u0027matchptr\u0027 pointer\nthe value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.\n\nThe call stack leading to the error looks like this:\n\nhda_component_manager_init\n|-\u003e component_match_add\n |-\u003e component_match_add_release\n |-\u003e __component_match_add ( ... ,**matchptr, ... )\n |-\u003e *matchptr = ERR_PTR(-ENOMEM); // assign\n|-\u003e component_master_add_with_match( ... match)\n |-\u003e component_match_realloc(match, match-\u003enum); // dereference\n\nAdd IS_ERR() check to prevent the crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40097",
"url": "https://www.suse.com/security/cve/CVE-2025-40097"
},
{
"category": "external",
"summary": "SUSE Bug 1252900 for CVE-2025-40097",
"url": "https://bugzilla.suse.com/1252900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40097"
},
{
"cve": "CVE-2025-40106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40106"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix divide-by-zero in comedi_buf_munge()\n\nThe comedi_buf_munge() function performs a modulo operation\n`async-\u003emunge_chan %= async-\u003ecmd.chanlist_len` without first\nchecking if chanlist_len is zero. If a user program submits a command with\nchanlist_len set to zero, this causes a divide-by-zero error when the device\nprocesses data in the interrupt handler path.\n\nAdd a check for zero chanlist_len at the beginning of the\nfunction, similar to the existing checks for !map and\nCMDF_RAWDATA flag. When chanlist_len is zero, update\nmunge_count and return early, indicating the data was\nhandled without munging.\n\nThis prevents potential kernel panics from malformed user commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40106",
"url": "https://www.suse.com/security/cve/CVE-2025-40106"
},
{
"category": "external",
"summary": "SUSE Bug 1252891 for CVE-2025-40106",
"url": "https://bugzilla.suse.com/1252891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40106"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - request reserved interrupt for virtual function\n\nThe device interrupt vector 3 is an error interrupt for\nphysical function and a reserved interrupt for virtual function.\nHowever, the driver has not registered the reserved interrupt for\nvirtual function. When allocating interrupts, the number of interrupts\nis allocated based on powers of two, which includes this interrupt.\nWhen the system enables GICv4 and the virtual function passthrough\nto the virtual machine, releasing the interrupt in the driver\ntriggers a warning.\n\nThe WARNING report is:\nWARNING: CPU: 62 PID: 14889 at arch/arm64/kvm/vgic/vgic-its.c:852 its_free_ite+0x94/0xb4\n\nTherefore, register a reserved interrupt for VF and set the\nIRQF_NO_AUTOEN flag to avoid that warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40136",
"url": "https://www.suse.com/security/cve/CVE-2025-40136"
},
{
"category": "external",
"summary": "SUSE Bug 1253340 for CVE-2025-40136",
"url": "https://bugzilla.suse.com/1253340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40136"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP\n\nWhen running as an SNP or TDX guest under KVM, force the legacy PCI hole,\ni.e. memory between Top of Lower Usable DRAM and 4GiB, to be mapped as UC\nvia a forced variable MTRR range.\n\nIn most KVM-based setups, legacy devices such as the HPET and TPM are\nenumerated via ACPI. ACPI enumeration includes a Memory32Fixed entry, and\noptionally a SystemMemory descriptor for an OperationRegion, e.g. if the\ndevice needs to be accessed via a Control Method.\n\nIf a SystemMemory entry is present, then the kernel\u0027s ACPI driver will\nauto-ioremap the region so that it can be accessed at will. However, the\nACPI spec doesn\u0027t provide a way to enumerate the memory type of\nSystemMemory regions, i.e. there\u0027s no way to tell software that a region\nmust be mapped as UC vs. WB, etc. As a result, Linux\u0027s ACPI driver always\nmaps SystemMemory regions using ioremap_cache(), i.e. as WB on x86.\n\nThe dedicated device drivers however, e.g. the HPET driver and TPM driver,\nwant to map their associated memory as UC or WC, as accessing PCI devices\nusing WB is unsupported.\n\nOn bare metal and non-CoCO, the conflicting requirements \"work\" as firmware\nconfigures the PCI hole (and other device memory) to be UC in the MTRRs.\nSo even though the ACPI mappings request WB, they are forced to UC- in the\nkernel\u0027s tracking due to the kernel properly handling the MTRR overrides,\nand thus are compatible with the drivers\u0027 requested WC/UC-.\n\nWith force WB MTRRs on SNP and TDX guests, the ACPI mappings get their\nrequested WB if the ACPI mappings are established before the dedicated\ndriver code attempts to initialize the device. E.g. if acpi_init()\nruns before the corresponding device driver is probed, ACPI\u0027s WB mapping\nwill \"win\", and result in the driver\u0027s ioremap() failing because the\nexisting WB mapping isn\u0027t compatible with the requested WC/UC-.\n\nE.g. when a TPM is emulated by the hypervisor (ignoring the security\nimplications of relying on what is allegedly an untrusted entity to store\nmeasurements), the TPM driver will request UC and fail:\n\n [ 1.730459] ioremap error for 0xfed40000-0xfed45000, requested 0x2, got 0x0\n [ 1.732780] tpm_tis MSFT0101:00: probe with driver tpm_tis failed with error -12\n\nNote, the \u00270x2\u0027 and \u00270x0\u0027 values refer to \"enum page_cache_mode\", not x86\u0027s\nmemtypes (which frustratingly are an almost pure inversion; 2 == WB, 0 == UC).\nE.g. tracing mapping requests for TPM TIS yields:\n\n Mapping TPM TIS with req_type = 0\n WARNING: CPU: 22 PID: 1 at arch/x86/mm/pat/memtype.c:530 memtype_reserve+0x2ab/0x460\n Modules linked in:\n CPU: 22 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W 6.16.0-rc7+ #2 VOLUNTARY\n Tainted: [W]=WARN\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/29/2025\n RIP: 0010:memtype_reserve+0x2ab/0x460\n __ioremap_caller+0x16d/0x3d0\n ioremap_cache+0x17/0x30\n x86_acpi_os_ioremap+0xe/0x20\n acpi_os_map_iomem+0x1f3/0x240\n acpi_os_map_memory+0xe/0x20\n acpi_ex_system_memory_space_handler+0x273/0x440\n acpi_ev_address_space_dispatch+0x176/0x4c0\n acpi_ex_access_region+0x2ad/0x530\n acpi_ex_field_datum_io+0xa2/0x4f0\n acpi_ex_extract_from_field+0x296/0x3e0\n acpi_ex_read_data_from_field+0xd1/0x460\n acpi_ex_resolve_node_to_value+0x2ee/0x530\n acpi_ex_resolve_to_value+0x1f2/0x540\n acpi_ds_evaluate_name_path+0x11b/0x190\n acpi_ds_exec_end_op+0x456/0x960\n acpi_ps_parse_loop+0x27a/0xa50\n acpi_ps_parse_aml+0x226/0x600\n acpi_ps_execute_method+0x172/0x3e0\n acpi_ns_evaluate+0x175/0x5f0\n acpi_evaluate_object+0x213/0x490\n acpi_evaluate_integer+0x6d/0x140\n acpi_bus_get_status+0x93/0x150\n acpi_add_single_object+0x43a/0x7c0\n acpi_bus_check_add+0x149/0x3a0\n acpi_bus_check_add_1+0x16/0x30\n acpi_ns_walk_namespace+0x22c/0x360\n acpi_walk_namespace+0x15c/0x170\n acpi_bus_scan+0x1dd/0x200\n acpi_scan_init+0xe5/0x2b0\n acpi_init+0x264/0x5b0\n do_one_i\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40181",
"url": "https://www.suse.com/security/cve/CVE-2025-40181"
},
{
"category": "external",
"summary": "SUSE Bug 1253471 for CVE-2025-40181",
"url": "https://bugzilla.suse.com/1253471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40181"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix IPsec cleanup over MPV device\n\nWhen we do mlx5e_detach_netdev() we eventually disable blocking events\nnotifier, among those events are IPsec MPV events from IB to core.\n\nSo before disabling those blocking events, make sure to also unregister\nthe devcom device and mark all this device operations as complete,\nin order to prevent the other device from using invalid netdev\nduring future devcom events which could cause the trace below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000010\nPGD 146427067 P4D 146427067 PUD 146488067 PMD 0\nOops: Oops: 0000 [#1] SMP\nCPU: 1 UID: 0 PID: 7735 Comm: devlink Tainted: GW 6.12.0-rc6_for_upstream_min_debug_2024_11_08_00_46 #1\nTainted: [W]=WARN\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]\nCode: 00 01 48 83 05 23 32 1e 00 01 41 b8 ed ff ff ff e9 60 ff ff ff 48 83 05 00 32 1e 00 01 eb e3 66 0f 1f 44 00 00 0f 1f 44 00 00 \u003c48\u003e 8b 47 10 48 83 05 5f 32 1e 00 01 48 8b 50 40 48 85 d2 74 05 40\nRSP: 0018:ffff88811a5c35f8 EFLAGS: 00010206\nRAX: ffff888106e8ab80 RBX: ffff888107d7e200 RCX: ffff88810d6f0a00\nRDX: ffff88810d6f0a00 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffff88811a17e620 R08: 0000000000000040 R09: 0000000000000000\nR10: ffff88811a5c3618 R11: 0000000de85d51bd R12: ffff88811a17e600\nR13: ffff88810d6f0a00 R14: 0000000000000000 R15: ffff8881034bda80\nFS: 00007f27bdf89180(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000010 CR3: 000000010f159005 CR4: 0000000000372eb0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x60\n ? page_fault_oops+0x150/0x3e0\n ? exc_page_fault+0x74/0x130\n ? asm_exc_page_fault+0x22/0x30\n ? mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]\n mlx5e_devcom_event_mpv+0x42/0x60 [mlx5_core]\n mlx5_devcom_send_event+0x8c/0x170 [mlx5_core]\n blocking_event+0x17b/0x230 [mlx5_core]\n notifier_call_chain+0x35/0xa0\n blocking_notifier_call_chain+0x3d/0x60\n mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]\n mlx5_core_mp_event_replay+0x12/0x20 [mlx5_core]\n mlx5_ib_bind_slave_port+0x228/0x2c0 [mlx5_ib]\n mlx5_ib_stage_init_init+0x664/0x9d0 [mlx5_ib]\n ? idr_alloc_cyclic+0x50/0xb0\n ? __kmalloc_cache_noprof+0x167/0x340\n ? __kmalloc_noprof+0x1a7/0x430\n __mlx5_ib_add+0x34/0xd0 [mlx5_ib]\n mlx5r_probe+0xe9/0x310 [mlx5_ib]\n ? kernfs_add_one+0x107/0x150\n ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]\n auxiliary_bus_probe+0x3e/0x90\n really_probe+0xc5/0x3a0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x86/0xa0\n device_add+0x62d/0x830\n __auxiliary_device_add+0x3b/0xa0\n ? auxiliary_device_init+0x41/0x90\n add_adev+0xd1/0x150 [mlx5_core]\n mlx5_rescan_drivers_locked+0x21c/0x300 [mlx5_core]\n esw_mode_change+0x6c/0xc0 [mlx5_core]\n mlx5_devlink_eswitch_mode_set+0x21e/0x640 [mlx5_core]\n devlink_nl_eswitch_set_doit+0x60/0xe0\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x180/0x2b0\n ? devlink_get_from_attrs_lock+0x170/0x170\n ? devlink_nl_eswitch_get_doit+0x290/0x290\n ? devlink_nl_pre_doit_port_optional+0x50/0x50\n ? genl_family_rcv_msg_dumpit+0xf0/0xf0\n netlink_rcv_skb+0x54/0x100\n genl_rcv+0x24/0x40\n netlink_unicast+0x1fc/0x2d0\n netlink_sendmsg+0x1e4/0x410\n __sock_sendmsg+0x38/0x60\n ? sockfd_lookup_light+0x12/0x60\n __sys_sendto+0x105/0x160\n ? __sys_recvmsg+0x4e/0x90\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x4c/0x100\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7f27bc91b13a\nCode: bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fa 96 2c 00 45 89 c9 4c 63 d1 48 63 ff 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40238",
"url": "https://www.suse.com/security/cve/CVE-2025-40238"
},
{
"category": "external",
"summary": "SUSE Bug 1254871 for CVE-2025-40238",
"url": "https://bugzilla.suse.com/1254871"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40238"
},
{
"cve": "CVE-2025-40254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: remove never-working support for setting nsh fields\n\nThe validation of the set(nsh(...)) action is completely wrong.\nIt runs through the nsh_key_put_from_nlattr() function that is the\nsame function that validates NSH keys for the flow match and the\npush_nsh() action. However, the set(nsh(...)) has a very different\nmemory layout. Nested attributes in there are doubled in size in\ncase of the masked set(). That makes proper validation impossible.\n\nThere is also confusion in the code between the \u0027masked\u0027 flag, that\nsays that the nested attributes are doubled in size containing both\nthe value and the mask, and the \u0027is_mask\u0027 that says that the value\nwe\u0027re parsing is the mask. This is causing kernel crash on trying to\nwrite into mask part of the match with SW_FLOW_KEY_PUT() during\nvalidation, while validate_nsh() doesn\u0027t allocate any memory for it:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 1c2383067 P4D 1c2383067 PUD 20b703067 PMD 0\n Oops: Oops: 0000 [#1] SMP NOPTI\n CPU: 8 UID: 0 Kdump: loaded Not tainted 6.17.0-rc4+ #107 PREEMPT(voluntary)\n RIP: 0010:nsh_key_put_from_nlattr+0x19d/0x610 [openvswitch]\n Call Trace:\n \u003cTASK\u003e\n validate_nsh+0x60/0x90 [openvswitch]\n validate_set.constprop.0+0x270/0x3c0 [openvswitch]\n __ovs_nla_copy_actions+0x477/0x860 [openvswitch]\n ovs_nla_copy_actions+0x8d/0x100 [openvswitch]\n ovs_packet_cmd_execute+0x1cc/0x310 [openvswitch]\n genl_family_rcv_msg_doit+0xdb/0x130\n genl_family_rcv_msg+0x14b/0x220\n genl_rcv_msg+0x47/0xa0\n netlink_rcv_skb+0x53/0x100\n genl_rcv+0x24/0x40\n netlink_unicast+0x280/0x3b0\n netlink_sendmsg+0x1f7/0x430\n ____sys_sendmsg+0x36b/0x3a0\n ___sys_sendmsg+0x87/0xd0\n __sys_sendmsg+0x6d/0xd0\n do_syscall_64+0x7b/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe third issue with this process is that while trying to convert\nthe non-masked set into masked one, validate_set() copies and doubles\nthe size of the OVS_KEY_ATTR_NSH as if it didn\u0027t have any nested\nattributes. It should be copying each nested attribute and doubling\nthem in size independently. And the process must be properly reversed\nduring the conversion back from masked to a non-masked variant during\nthe flow dump.\n\nIn the end, the only two outcomes of trying to use this action are\neither validation failure or a kernel crash. And if somehow someone\nmanages to install a flow with such an action, it will most definitely\nnot do what it is supposed to, since all the keys and the masks are\nmixed up.\n\nFixing all the issues is a complex task as it requires re-writing\nmost of the validation code.\n\nGiven that and the fact that this functionality never worked since\nintroduction, let\u0027s just remove it altogether. It\u0027s better to\nre-introduce it later with a proper implementation instead of trying\nto fix it in stable releases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40254",
"url": "https://www.suse.com/security/cve/CVE-2025-40254"
},
{
"category": "external",
"summary": "SUSE Bug 1254852 for CVE-2025-40254",
"url": "https://bugzilla.suse.com/1254852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40254"
},
{
"cve": "CVE-2025-40257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40257"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix a race in mptcp_pm_del_add_timer()\n\nmptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, \u0026entry-\u003eadd_timer)\nwhile another might have free entry already, as reported by syzbot.\n\nAdd RCU protection to fix this issue.\n\nAlso change confusing add_timer variable with stop_timer boolean.\n\nsyzbot report:\n\nBUG: KASAN: slab-use-after-free in __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616\nRead of size 4 at addr ffff8880311e4150 by task kworker/1:1/44\n\nCPU: 1 UID: 0 PID: 44 Comm: kworker/1:1 Not tainted syzkaller #0 PREEMPT_{RT,(full)}\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025\nWorkqueue: events mptcp_worker\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616\n sk_stop_timer_sync+0x1b/0x90 net/core/sock.c:3631\n mptcp_pm_del_add_timer+0x283/0x310 net/mptcp/pm.c:362\n mptcp_incoming_options+0x1357/0x1f60 net/mptcp/options.c:1174\n tcp_data_queue+0xca/0x6450 net/ipv4/tcp_input.c:5361\n tcp_rcv_established+0x1335/0x2670 net/ipv4/tcp_input.c:6441\n tcp_v4_do_rcv+0x98b/0xbf0 net/ipv4/tcp_ipv4.c:1931\n tcp_v4_rcv+0x252a/0x2dc0 net/ipv4/tcp_ipv4.c:2374\n ip_protocol_deliver_rcu+0x221/0x440 net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:239\n NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318\n NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318\n __netif_receive_skb_one_core net/core/dev.c:6079 [inline]\n __netif_receive_skb+0x143/0x380 net/core/dev.c:6192\n process_backlog+0x31e/0x900 net/core/dev.c:6544\n __napi_poll+0xb6/0x540 net/core/dev.c:7594\n napi_poll net/core/dev.c:7657 [inline]\n net_rx_action+0x5f7/0xda0 net/core/dev.c:7784\n handle_softirqs+0x22f/0x710 kernel/softirq.c:622\n __do_softirq kernel/softirq.c:656 [inline]\n __local_bh_enable_ip+0x1a0/0x2e0 kernel/softirq.c:302\n mptcp_pm_send_ack net/mptcp/pm.c:210 [inline]\n mptcp_pm_addr_send_ack+0x41f/0x500 net/mptcp/pm.c:-1\n mptcp_pm_worker+0x174/0x320 net/mptcp/pm.c:1002\n mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762\n process_one_work kernel/workqueue.c:3263 [inline]\n process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \u003c/TASK\u003e\n\nAllocated by task 44:\n kasan_save_stack mm/kasan/common.c:56 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:77\n poison_kmalloc_redzone mm/kasan/common.c:400 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417\n kasan_kmalloc include/linux/kasan.h:262 [inline]\n __kmalloc_cache_noprof+0x1ef/0x6c0 mm/slub.c:5748\n kmalloc_noprof include/linux/slab.h:957 [inline]\n mptcp_pm_alloc_anno_list+0x104/0x460 net/mptcp/pm.c:385\n mptcp_pm_create_subflow_or_signal_addr+0xf9d/0x1360 net/mptcp/pm_kernel.c:355\n mptcp_pm_nl_fully_established net/mptcp/pm_kernel.c:409 [inline]\n __mptcp_pm_kernel_worker+0x417/0x1ef0 net/mptcp/pm_kernel.c:1529\n mptcp_pm_worker+0x1ee/0x320 net/mptcp/pm.c:1008\n mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762\n process_one_work kernel/workqueue.c:3263 [inline]\n process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n\nFreed by task 6630:\n kasan_save_stack mm/kasan/common.c:56 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:77\n __kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:587\n kasan_save_free_info mm/kasan/kasan.h:406 [inline]\n poison_slab_object m\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40257",
"url": "https://www.suse.com/security/cve/CVE-2025-40257"
},
{
"category": "external",
"summary": "SUSE Bug 1254842 for CVE-2025-40257",
"url": "https://bugzilla.suse.com/1254842"
},
{
"category": "external",
"summary": "SUSE Bug 1257242 for CVE-2025-40257",
"url": "https://bugzilla.suse.com/1257242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-40257"
},
{
"cve": "CVE-2025-40259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40259"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Do not sleep in atomic context\n\nsg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may\nsleep. Hence, call sg_finish_rem_req() with interrupts enabled instead\nof disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40259",
"url": "https://www.suse.com/security/cve/CVE-2025-40259"
},
{
"category": "external",
"summary": "SUSE Bug 1254845 for CVE-2025-40259",
"url": "https://bugzilla.suse.com/1254845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40259"
},
{
"cve": "CVE-2025-40261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl()\n\nnvme_fc_delete_assocation() waits for pending I/O to complete before\nreturning, and an error can cause -\u003eioerr_work to be queued after\ncancel_work_sync() had been called. Move the call to cancel_work_sync() to\nbe after nvme_fc_delete_association() to ensure -\u003eioerr_work is not running\nwhen the nvme_fc_ctrl object is freed. Otherwise the following can occur:\n\n[ 1135.911754] list_del corruption, ff2d24c8093f31f8-\u003enext is NULL\n[ 1135.917705] ------------[ cut here ]------------\n[ 1135.922336] kernel BUG at lib/list_debug.c:52!\n[ 1135.926784] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 1135.931851] CPU: 48 UID: 0 PID: 726 Comm: kworker/u449:23 Kdump: loaded Not tainted 6.12.0 #1 PREEMPT(voluntary)\n[ 1135.943490] Hardware name: Dell Inc. PowerEdge R660/0HGTK9, BIOS 2.5.4 01/16/2025\n[ 1135.950969] Workqueue: 0x0 (nvme-wq)\n[ 1135.954673] RIP: 0010:__list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1135.961041] Code: c7 c7 98 68 72 94 e8 26 45 fe ff 0f 0b 48 c7 c7 70 68 72 94 e8 18 45 fe ff 0f 0b 48 89 fe 48 c7 c7 80 69 72 94 e8 07 45 fe ff \u003c0f\u003e 0b 48 89 d1 48 c7 c7 a0 6a 72 94 48 89 c2 e8 f3 44 fe ff 0f 0b\n[ 1135.979788] RSP: 0018:ff579b19482d3e50 EFLAGS: 00010046\n[ 1135.985015] RAX: 0000000000000033 RBX: ff2d24c8093f31f0 RCX: 0000000000000000\n[ 1135.992148] RDX: 0000000000000000 RSI: ff2d24d6bfa1d0c0 RDI: ff2d24d6bfa1d0c0\n[ 1135.999278] RBP: ff2d24c8093f31f8 R08: 0000000000000000 R09: ffffffff951e2b08\n[ 1136.006413] R10: ffffffff95122ac8 R11: 0000000000000003 R12: ff2d24c78697c100\n[ 1136.013546] R13: fffffffffffffff8 R14: 0000000000000000 R15: ff2d24c78697c0c0\n[ 1136.020677] FS: 0000000000000000(0000) GS:ff2d24d6bfa00000(0000) knlGS:0000000000000000\n[ 1136.028765] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1136.034510] CR2: 00007fd207f90b80 CR3: 000000163ea22003 CR4: 0000000000f73ef0\n[ 1136.041641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1136.048776] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 1136.055910] PKRU: 55555554\n[ 1136.058623] Call Trace:\n[ 1136.061074] \u003cTASK\u003e\n[ 1136.063179] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.067540] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.071898] ? move_linked_works+0x4a/0xa0\n[ 1136.075998] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.081744] ? __die_body.cold+0x8/0x12\n[ 1136.085584] ? die+0x2e/0x50\n[ 1136.088469] ? do_trap+0xca/0x110\n[ 1136.091789] ? do_error_trap+0x65/0x80\n[ 1136.095543] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.101289] ? exc_invalid_op+0x50/0x70\n[ 1136.105127] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.110874] ? asm_exc_invalid_op+0x1a/0x20\n[ 1136.115059] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.120806] move_linked_works+0x4a/0xa0\n[ 1136.124733] worker_thread+0x216/0x3a0\n[ 1136.128485] ? __pfx_worker_thread+0x10/0x10\n[ 1136.132758] kthread+0xfa/0x240\n[ 1136.135904] ? __pfx_kthread+0x10/0x10\n[ 1136.139657] ret_from_fork+0x31/0x50\n[ 1136.143236] ? __pfx_kthread+0x10/0x10\n[ 1136.146988] ret_from_fork_asm+0x1a/0x30\n[ 1136.150915] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40261",
"url": "https://www.suse.com/security/cve/CVE-2025-40261"
},
{
"category": "external",
"summary": "SUSE Bug 1254839 for CVE-2025-40261",
"url": "https://bugzilla.suse.com/1254839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40261"
},
{
"cve": "CVE-2025-40264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: pass wrb_params in case of OS2BMC\n\nbe_insert_vlan_in_pkt() is called with the wrb_params argument being NULL\nat be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL\npointer when processing a workaround for specific packet, as commit\nbc0c3405abbb (\"be2net: fix a Tx stall bug caused by a specific ipv6\npacket\") states.\n\nThe correct way would be to pass the wrb_params from be_xmit().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40264",
"url": "https://www.suse.com/security/cve/CVE-2025-40264"
},
{
"category": "external",
"summary": "SUSE Bug 1254835 for CVE-2025-40264",
"url": "https://bugzilla.suse.com/1254835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40264"
},
{
"cve": "CVE-2025-40328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_close_cached_fid()\n\nfind_or_create_cached_dir() could grab a new reference after kref_put()\nhad seen the refcount drop to zero but before cfid_list_lock is acquired\nin smb2_close_cached_fid(), leading to use-after-free.\n\nSwitch to kref_put_lock() so cfid_release() is called with\ncfid_list_lock held, closing that gap.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40328",
"url": "https://www.suse.com/security/cve/CVE-2025-40328"
},
{
"category": "external",
"summary": "SUSE Bug 1254624 for CVE-2025-40328",
"url": "https://bugzilla.suse.com/1254624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40328"
},
{
"cve": "CVE-2025-40350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40350"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ\n\nXDP programs can change the layout of an xdp_buff through\nbpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver\ncannot assume the size of the linear data area nor fragments. Fix the\nbug in mlx5 by generating skb according to xdp_buff after XDP programs\nrun.\n\nCurrently, when handling multi-buf XDP, the mlx5 driver assumes the\nlayout of an xdp_buff to be unchanged. That is, the linear data area\ncontinues to be empty and fragments remain the same. This may cause\nthe driver to generate erroneous skb or triggering a kernel\nwarning. When an XDP program added linear data through\nbpf_xdp_adjust_head(), the linear data will be ignored as\nmlx5e_build_linear_skb() builds an skb without linear data and then\npull data from fragments to fill the linear data area. When an XDP\nprogram has shrunk the non-linear data through bpf_xdp_adjust_tail(),\nthe delta passed to __pskb_pull_tail() may exceed the actual nonlinear\ndata size and trigger the BUG_ON in it.\n\nTo fix the issue, first record the original number of fragments. If the\nnumber of fragments changes after the XDP program runs, rewind the end\nfragment pointer by the difference and recalculate the truesize. Then,\nbuild the skb with the linear data area matching the xdp_buff. Finally,\nonly pull data in if there is non-linear data and fill the linear part\nup to 256 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40350",
"url": "https://www.suse.com/security/cve/CVE-2025-40350"
},
{
"category": "external",
"summary": "SUSE Bug 1255260 for CVE-2025-40350",
"url": "https://bugzilla.suse.com/1255260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40350"
},
{
"cve": "CVE-2025-40355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsysfs: check visibility before changing group attribute ownership\n\nSince commit 0c17270f9b92 (\"net: sysfs: Implement is_visible for\nphys_(port_id, port_name, switch_id)\"), __dev_change_net_namespace() can\nhit WARN_ON() when trying to change owner of a file that isn\u0027t visible.\nSee the trace below:\n\n WARNING: CPU: 6 PID: 2938 at net/core/dev.c:12410 __dev_change_net_namespace+0xb89/0xc30\n CPU: 6 UID: 0 PID: 2938 Comm: incusd Not tainted 6.17.1-1-mainline #1 PREEMPT(full) 4b783b4a638669fb644857f484487d17cb45ed1f\n Hardware name: Framework Laptop 13 (AMD Ryzen 7040Series)/FRANMDCP07, BIOS 03.07 02/19/2025\n RIP: 0010:__dev_change_net_namespace+0xb89/0xc30\n [...]\n Call Trace:\n \u003cTASK\u003e\n ? if6_seq_show+0x30/0x50\n do_setlink.isra.0+0xc7/0x1270\n ? __nla_validate_parse+0x5c/0xcc0\n ? security_capable+0x94/0x1a0\n rtnl_newlink+0x858/0xc20\n ? update_curr+0x8e/0x1c0\n ? update_entity_lag+0x71/0x80\n ? sched_balance_newidle+0x358/0x450\n ? psi_task_switch+0x113/0x2a0\n ? __pfx_rtnl_newlink+0x10/0x10\n rtnetlink_rcv_msg+0x346/0x3e0\n ? sched_clock+0x10/0x30\n ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x59/0x110\n netlink_unicast+0x285/0x3c0\n ? __alloc_skb+0xdb/0x1a0\n netlink_sendmsg+0x20d/0x430\n ____sys_sendmsg+0x39f/0x3d0\n ? import_iovec+0x2f/0x40\n ___sys_sendmsg+0x99/0xe0\n __sys_sendmsg+0x8a/0xf0\n do_syscall_64+0x81/0x970\n ? __sys_bind+0xe3/0x110\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? sock_alloc_file+0x63/0xc0\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? alloc_fd+0x12e/0x190\n ? put_unused_fd+0x2a/0x70\n ? do_sys_openat2+0xa2/0xe0\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? exc_page_fault+0x7e/0x1a0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [...]\n \u003c/TASK\u003e\n\nFix this by checking is_visible() before trying to touch the attribute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40355",
"url": "https://www.suse.com/security/cve/CVE-2025-40355"
},
{
"category": "external",
"summary": "SUSE Bug 1255261 for CVE-2025-40355",
"url": "https://bugzilla.suse.com/1255261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-40355"
},
{
"cve": "CVE-2025-40363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: fix field-spanning memcpy warning in AH output\n\nFix field-spanning memcpy warnings in ah6_output() and\nah6_output_done() where extension headers are copied to/from IPv6\naddress fields, triggering fortify-string warnings about writes beyond\nthe 16-byte address fields.\n\n memcpy: detected field-spanning write (size 40) of single field \"\u0026top_iph-\u003esaddr\" at net/ipv6/ah6.c:439 (size 16)\n WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439\n\nThe warnings are false positives as the extension headers are\nintentionally placed after the IPv6 header in memory. Fix by properly\ncopying addresses and extension headers separately, and introduce\nhelper functions to avoid code duplication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40363",
"url": "https://www.suse.com/security/cve/CVE-2025-40363"
},
{
"category": "external",
"summary": "SUSE Bug 1255102 for CVE-2025-40363",
"url": "https://bugzilla.suse.com/1255102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2025-40363"
},
{
"cve": "CVE-2025-68171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Ensure XFD state on signal delivery\n\nSean reported [1] the following splat when running KVM tests:\n\n WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70\n Call Trace:\n \u003cTASK\u003e\n fpu__clear_user_states+0x9c/0x100\n arch_do_signal_or_restart+0x142/0x210\n exit_to_user_mode_loop+0x55/0x100\n do_syscall_64+0x205/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nChao further identified [2] a reproducible scenario involving signal\ndelivery: a non-AMX task is preempted by an AMX-enabled task which\nmodifies the XFD MSR.\n\nWhen the non-AMX task resumes and reloads XSTATE with init values,\na warning is triggered due to a mismatch between fpstate::xfd and the\nCPU\u0027s current XFD state. fpu__clear_user_states() does not currently\nre-synchronize the XFD state after such preemption.\n\nInvoke xfd_update_state() which detects and corrects the mismatch if\nthere is a dynamic feature.\n\nThis also benefits the sigreturn path, as fpu__restore_sig() may call\nfpu__clear_user_states() when the sigframe is inaccessible.\n\n[ dhansen: minor changelog munging ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68171",
"url": "https://www.suse.com/security/cve/CVE-2025-68171"
},
{
"category": "external",
"summary": "SUSE Bug 1255255 for CVE-2025-68171",
"url": "https://bugzilla.suse.com/1255255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68171"
},
{
"cve": "CVE-2025-68174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68174"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: enhance kfd process check in switch partition\n\ncurrent switch partition only check if kfd_processes_table is empty.\nkfd_prcesses_table entry is deleted in kfd_process_notifier_release, but\nkfd_process tear down is in kfd_process_wq_release.\n\nconsider two processes:\n\nProcess A (workqueue) -\u003e kfd_process_wq_release -\u003e Access kfd_node member\nProcess B switch partition -\u003e amdgpu_xcp_pre_partition_switch -\u003e amdgpu_amdkfd_device_fini_sw\n-\u003e kfd_node tear down.\n\nProcess A and B may trigger a race as shown in dmesg log.\n\nThis patch is to resolve the race by adding an atomic kfd_process counter\nkfd_processes_count, it increment as create kfd process, decrement as\nfinish kfd_process_wq_release.\n\nv2: Put kfd_processes_count per kfd_dev, move decrement to kfd_process_destroy_pdds\nand bug fix. (Philip Yang)\n\n[3966658.307702] divide error: 0000 [#1] SMP NOPTI\n[3966658.350818] i10nm_edac\n[3966658.356318] CPU: 124 PID: 38435 Comm: kworker/124:0 Kdump: loaded Tainted\n[3966658.356890] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]\n[3966658.362839] nfit\n[3966658.366457] RIP: 0010:kfd_get_num_sdma_engines+0x17/0x40 [amdgpu]\n[3966658.366460] Code: 00 00 e9 ac 81 02 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 48 8b 4f 08 48 8b b7 00 01 00 00 8b 81 58 26 03 00 99 \u003cf7\u003e be b8 01 00 00 80 b9 70 2e 00 00 00 74 0b 83 f8 02 ba 02 00 00\n[3966658.380967] x86_pkg_temp_thermal\n[3966658.391529] RSP: 0018:ffffc900a0edfdd8 EFLAGS: 00010246\n[3966658.391531] RAX: 0000000000000008 RBX: ffff8974e593b800 RCX: ffff888645900000\n[3966658.391531] RDX: 0000000000000000 RSI: ffff888129154400 RDI: ffff888129151c00\n[3966658.391532] RBP: ffff8883ad79d400 R08: 0000000000000000 R09: ffff8890d2750af4\n[3966658.391532] R10: 0000000000000018 R11: 0000000000000018 R12: 0000000000000000\n[3966658.391533] R13: ffff8883ad79d400 R14: ffffe87ff662ba00 R15: ffff8974e593b800\n[3966658.391533] FS: 0000000000000000(0000) GS:ffff88fe7f600000(0000) knlGS:0000000000000000\n[3966658.391534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[3966658.391534] CR2: 0000000000d71000 CR3: 000000dd0e970004 CR4: 0000000002770ee0\n[3966658.391535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[3966658.391535] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[3966658.391536] PKRU: 55555554\n[3966658.391536] Call Trace:\n[3966658.391674] deallocate_sdma_queue+0x38/0xa0 [amdgpu]\n[3966658.391762] process_termination_cpsch+0x1ed/0x480 [amdgpu]\n[3966658.399754] intel_powerclamp\n[3966658.402831] kfd_process_dequeue_from_all_devices+0x5b/0xc0 [amdgpu]\n[3966658.402908] kfd_process_wq_release+0x1a/0x1a0 [amdgpu]\n[3966658.410516] coretemp\n[3966658.434016] process_one_work+0x1ad/0x380\n[3966658.434021] worker_thread+0x49/0x310\n[3966658.438963] kvm_intel\n[3966658.446041] ? process_one_work+0x380/0x380\n[3966658.446045] kthread+0x118/0x140\n[3966658.446047] ? __kthread_bind_mask+0x60/0x60\n[3966658.446050] ret_from_fork+0x1f/0x30\n[3966658.446053] Modules linked in: kpatch_20765354(OEK)\n[3966658.455310] kvm\n[3966658.464534] mptcp_diag xsk_diag raw_diag unix_diag af_packet_diag netlink_diag udp_diag act_pedit act_mirred act_vlan cls_flower kpatch_21951273(OEK) kpatch_18424469(OEK) kpatch_19749756(OEK)\n[3966658.473462] idxd_mdev\n[3966658.482306] kpatch_17971294(OEK) sch_ingress xt_conntrack amdgpu(OE) amdxcp(OE) amddrm_buddy(OE) amd_sched(OE) amdttm(OE) amdkcl(OE) intel_ifs iptable_mangle tcm_loop target_core_pscsi tcp_diag target_core_file inet_diag target_core_iblock target_core_user target_core_mod coldpgs kpatch_18383292(OEK) ip6table_nat ip6table_filter ip6_tables ip_set_hash_ipportip ip_set_hash_ipportnet ip_set_hash_ipport ip_set_bitmap_port xt_comment iptable_nat nf_nat iptable_filter ip_tables ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sn_core_odd(OE) i40e overlay binfmt_misc tun bonding(OE) aisqos(OE) aisqo\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68174",
"url": "https://www.suse.com/security/cve/CVE-2025-68174"
},
{
"category": "external",
"summary": "SUSE Bug 1255327 for CVE-2025-68174",
"url": "https://bugzilla.suse.com/1255327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68174"
},
{
"cve": "CVE-2025-68178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix possible deadlock while configuring policy\n\nFollowing deadlock can be triggered easily by lockdep:\n\nWARNING: possible circular locking dependency detected\n6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted\n------------------------------------------------------\ncheck/1334 is trying to acquire lock:\nff1100011d9d0678 (\u0026q-\u003esysfs_lock){+.+.}-{4:4}, at: blk_unregister_queue+0x53/0x180\n\nbut task is already holding lock:\nff1100011d9d00e0 (\u0026q-\u003eq_usage_counter(queue)#3){++++}-{0:0}, at: del_gendisk+0xba/0x110\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #2 (\u0026q-\u003eq_usage_counter(queue)#3){++++}-{0:0}:\n blk_queue_enter+0x40b/0x470\n blkg_conf_prep+0x7b/0x3c0\n tg_set_limit+0x10a/0x3e0\n cgroup_file_write+0xc6/0x420\n kernfs_fop_write_iter+0x189/0x280\n vfs_write+0x256/0x490\n ksys_write+0x83/0x190\n __x64_sys_write+0x21/0x30\n x64_sys_call+0x4608/0x4630\n do_syscall_64+0xdb/0x6b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n-\u003e #1 (\u0026q-\u003erq_qos_mutex){+.+.}-{4:4}:\n __mutex_lock+0xd8/0xf50\n mutex_lock_nested+0x2b/0x40\n wbt_init+0x17e/0x280\n wbt_enable_default+0xe9/0x140\n blk_register_queue+0x1da/0x2e0\n __add_disk+0x38c/0x5d0\n add_disk_fwnode+0x89/0x250\n device_add_disk+0x18/0x30\n virtblk_probe+0x13a3/0x1800\n virtio_dev_probe+0x389/0x610\n really_probe+0x136/0x620\n __driver_probe_device+0xb3/0x230\n driver_probe_device+0x2f/0xe0\n __driver_attach+0x158/0x250\n bus_for_each_dev+0xa9/0x130\n driver_attach+0x26/0x40\n bus_add_driver+0x178/0x3d0\n driver_register+0x7d/0x1c0\n __register_virtio_driver+0x2c/0x60\n virtio_blk_init+0x6f/0xe0\n do_one_initcall+0x94/0x540\n kernel_init_freeable+0x56a/0x7b0\n kernel_init+0x2b/0x270\n ret_from_fork+0x268/0x4c0\n ret_from_fork_asm+0x1a/0x30\n\n-\u003e #0 (\u0026q-\u003esysfs_lock){+.+.}-{4:4}:\n __lock_acquire+0x1835/0x2940\n lock_acquire+0xf9/0x450\n __mutex_lock+0xd8/0xf50\n mutex_lock_nested+0x2b/0x40\n blk_unregister_queue+0x53/0x180\n __del_gendisk+0x226/0x690\n del_gendisk+0xba/0x110\n sd_remove+0x49/0xb0 [sd_mod]\n device_remove+0x87/0xb0\n device_release_driver_internal+0x11e/0x230\n device_release_driver+0x1a/0x30\n bus_remove_device+0x14d/0x220\n device_del+0x1e1/0x5a0\n __scsi_remove_device+0x1ff/0x2f0\n scsi_remove_device+0x37/0x60\n sdev_store_delete+0x77/0x100\n dev_attr_store+0x1f/0x40\n sysfs_kf_write+0x65/0x90\n kernfs_fop_write_iter+0x189/0x280\n vfs_write+0x256/0x490\n ksys_write+0x83/0x190\n __x64_sys_write+0x21/0x30\n x64_sys_call+0x4608/0x4630\n do_syscall_64+0xdb/0x6b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nother info that might help us debug this:\n\nChain exists of:\n \u0026q-\u003esysfs_lock --\u003e \u0026q-\u003erq_qos_mutex --\u003e \u0026q-\u003eq_usage_counter(queue)#3\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026q-\u003eq_usage_counter(queue)#3);\n lock(\u0026q-\u003erq_qos_mutex);\n lock(\u0026q-\u003eq_usage_counter(queue)#3);\n lock(\u0026q-\u003esysfs_lock);\n\nRoot cause is that queue_usage_counter is grabbed with rq_qos_mutex\nheld in blkg_conf_prep(), while queue should be freezed before\nrq_qos_mutex from other context.\n\nThe blk_queue_enter() from blkg_conf_prep() is used to protect against\npolicy deactivation, which is already protected with blkcg_mutex, hence\nconvert blk_queue_enter() to blkcg_mutex to fix this problem. Meanwhile,\nconsider that blkcg_mutex is held after queue is freezed from policy\ndeactivation, also convert blkg_alloc() to use GFP_NOIO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68178",
"url": "https://www.suse.com/security/cve/CVE-2025-68178"
},
{
"category": "external",
"summary": "SUSE Bug 1255266 for CVE-2025-68178",
"url": "https://bugzilla.suse.com/1255266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68178"
},
{
"cve": "CVE-2025-68188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()\n\nUse RCU to avoid a pair of atomic operations and a potential\nUAF on dst_dev()-\u003eflags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68188",
"url": "https://www.suse.com/security/cve/CVE-2025-68188"
},
{
"category": "external",
"summary": "SUSE Bug 1255269 for CVE-2025-68188",
"url": "https://bugzilla.suse.com/1255269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68188"
},
{
"cve": "CVE-2025-68200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add bpf_prog_run_data_pointers()\n\nsyzbot found that cls_bpf_classify() is able to change\ntc_skb_cb(skb)-\u003edrop_reason triggering a warning in sk_skb_reason_drop().\n\nWARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline]\nWARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214\n\nstruct tc_skb_cb has been added in commit ec624fe740b4 (\"net/sched:\nExtend qdisc control block with tc control block\"), which added a wrong\ninteraction with db58ba459202 (\"bpf: wire in data and data_end for\ncls_act_bpf\").\n\ndrop_reason was added later.\n\nAdd bpf_prog_run_data_pointers() helper to save/restore the net_sched\nstorage colliding with BPF data_meta/data_end.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68200",
"url": "https://www.suse.com/security/cve/CVE-2025-68200"
},
{
"category": "external",
"summary": "SUSE Bug 1255241 for CVE-2025-68200",
"url": "https://bugzilla.suse.com/1255241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68200"
},
{
"cve": "CVE-2025-68215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix PTP cleanup on driver removal in error path\n\nImprove the cleanup on releasing PTP resources in error path.\nThe error case might happen either at the driver probe and PTP\nfeature initialization or on PTP restart (errors in reset handling, NVM\nupdate etc). In both cases, calls to PF PTP cleanup (ice_ptp_cleanup_pf\nfunction) and \u0027ps_lock\u0027 mutex deinitialization were missed.\nAdditionally, ptp clock was not unregistered in the latter case.\n\nKeep PTP state as \u0027uninitialized\u0027 on init to distinguish between error\nscenarios and to avoid resource release duplication at driver removal.\n\nThe consequence of missing ice_ptp_cleanup_pf call is the following call\ntrace dumped when ice_adapter object is freed (port list is not empty,\nas it is required at this stage):\n\n[ T93022] ------------[ cut here ]------------\n[ T93022] WARNING: CPU: 10 PID: 93022 at\nice/ice_adapter.c:67 ice_adapter_put+0xef/0x100 [ice]\n...\n[ T93022] RIP: 0010:ice_adapter_put+0xef/0x100 [ice]\n...\n[ T93022] Call Trace:\n[ T93022] \u003cTASK\u003e\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] ? __warn.cold+0xb0/0x10e\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] ? report_bug+0xd8/0x150\n[ T93022] ? handle_bug+0xe9/0x110\n[ T93022] ? exc_invalid_op+0x17/0x70\n[ T93022] ? asm_exc_invalid_op+0x1a/0x20\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] pci_device_remove+0x42/0xb0\n[ T93022] device_release_driver_internal+0x19f/0x200\n[ T93022] driver_detach+0x48/0x90\n[ T93022] bus_remove_driver+0x70/0xf0\n[ T93022] pci_unregister_driver+0x42/0xb0\n[ T93022] ice_module_exit+0x10/0xdb0 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n...\n[ T93022] ---[ end trace 0000000000000000 ]---\n[ T93022] ice: module unloaded",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68215",
"url": "https://www.suse.com/security/cve/CVE-2025-68215"
},
{
"category": "external",
"summary": "SUSE Bug 1255226 for CVE-2025-68215",
"url": "https://bugzilla.suse.com/1255226"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68215"
},
{
"cve": "CVE-2025-68227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68227"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Fix proto fallback detection with BPF\n\nThe sockmap feature allows bpf syscall from userspace, or based\non bpf sockops, replacing the sk_prot of sockets during protocol stack\nprocessing with sockmap\u0027s custom read/write interfaces.\n\u0027\u0027\u0027\ntcp_rcv_state_process()\n syn_recv_sock()/subflow_syn_recv_sock()\n tcp_init_transfer(BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB)\n bpf_skops_established \u003c== sockops\n bpf_sock_map_update(sk) \u003c== call bpf helper\n tcp_bpf_update_proto() \u003c== update sk_prot\n\u0027\u0027\u0027\n\nWhen the server has MPTCP enabled but the client sends a TCP SYN\nwithout MPTCP, subflow_syn_recv_sock() performs a fallback on the\nsubflow, replacing the subflow sk\u0027s sk_prot with the native sk_prot.\n\u0027\u0027\u0027\nsubflow_syn_recv_sock()\n subflow_ulp_fallback()\n subflow_drop_ctx()\n mptcp_subflow_ops_undo_override()\n\u0027\u0027\u0027\n\nThen, this subflow can be normally used by sockmap, which replaces the\nnative sk_prot with sockmap\u0027s custom sk_prot. The issue occurs when the\nuser executes accept::mptcp_stream_accept::mptcp_fallback_tcp_ops().\nHere, it uses sk-\u003esk_prot to compare with the native sk_prot, but this\nis incorrect when sockmap is used, as we may incorrectly set\nsk-\u003esk_socket-\u003eops.\n\nThis fix uses the more generic sk_family for the comparison instead.\n\nAdditionally, this also prevents a WARNING from occurring:\n\nresult from ./scripts/decode_stacktrace.sh:\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 337 at net/mptcp/protocol.c:68 mptcp_stream_accept \\\n(net/mptcp/protocol.c:4005)\nModules linked in:\n...\n\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\ndo_accept (net/socket.c:1989)\n__sys_accept4 (net/socket.c:2028 net/socket.c:2057)\n__x64_sys_accept (net/socket.c:2067)\nx64_sys_call (arch/x86/entry/syscall_64.c:41)\ndo_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\nRIP: 0033:0x7f87ac92b83d\n\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68227",
"url": "https://www.suse.com/security/cve/CVE-2025-68227"
},
{
"category": "external",
"summary": "SUSE Bug 1255216 for CVE-2025-68227",
"url": "https://bugzilla.suse.com/1255216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68227"
},
{
"cve": "CVE-2025-68241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68241"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe\n\nThe sit driver\u0027s packet transmission path calls: sit_tunnel_xmit() -\u003e\nupdate_or_create_fnhe(), which lead to fnhe_remove_oldest() being called\nto delete entries exceeding FNHE_RECLAIM_DEPTH+random.\n\nThe race window is between fnhe_remove_oldest() selecting fnheX for\ndeletion and the subsequent kfree_rcu(). During this time, the\nconcurrent path\u0027s __mkroute_output() -\u003e find_exception() can fetch the\nsoon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a\nnew dst using a dst_hold(). When the original fnheX is freed via RCU,\nthe dst reference remains permanently leaked.\n\nCPU 0 CPU 1\n__mkroute_output()\n find_exception() [fnheX]\n update_or_create_fnhe()\n fnhe_remove_oldest() [fnheX]\n rt_bind_exception() [bind dst]\n RCU callback [fnheX freed, dst leak]\n\nThis issue manifests as a device reference count leak and a warning in\ndmesg when unregistering the net device:\n\n unregister_netdevice: waiting for sitX to become free. Usage count = N\n\nIdo Schimmel provided the simple test validation method [1].\n\nThe fix clears \u0027oldest-\u003efnhe_daddr\u0027 before calling fnhe_flush_routes().\nSince rt_bind_exception() checks this field, setting it to zero prevents\nthe stale fnhe from being reused and bound to a new dst just before it\nis freed.\n\n[1]\nip netns add ns1\nip -n ns1 link set dev lo up\nip -n ns1 address add 192.0.2.1/32 dev lo\nip -n ns1 link add name dummy1 up type dummy\nip -n ns1 route add 192.0.2.2/32 dev dummy1\nip -n ns1 link add name gretap1 up arp off type gretap \\\n local 192.0.2.1 remote 192.0.2.2\nip -n ns1 route add 198.51.0.0/16 dev gretap1\ntaskset -c 0 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\ntaskset -c 2 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\nsleep 10\nip netns pids ns1 | xargs kill\nip netns del ns1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68241",
"url": "https://www.suse.com/security/cve/CVE-2025-68241"
},
{
"category": "external",
"summary": "SUSE Bug 1255157 for CVE-2025-68241",
"url": "https://bugzilla.suse.com/1255157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68241"
},
{
"cve": "CVE-2025-68245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: fix incorrect refcount handling causing incorrect cleanup\n\ncommit efa95b01da18 (\"netpoll: fix use after free\") incorrectly\nignored the refcount and prematurely set dev-\u003enpinfo to NULL during\nnetpoll cleanup, leading to improper behavior and memory leaks.\n\nScenario causing lack of proper cleanup:\n\n1) A netpoll is associated with a NIC (e.g., eth0) and netdev-\u003enpinfo is\n allocated, and refcnt = 1\n - Keep in mind that npinfo is shared among all netpoll instances. In\n this case, there is just one.\n\n2) Another netpoll is also associated with the same NIC and\n npinfo-\u003erefcnt += 1.\n - Now dev-\u003enpinfo-\u003erefcnt = 2;\n - There is just one npinfo associated to the netdev.\n\n3) When the first netpolls goes to clean up:\n - The first cleanup succeeds and clears np-\u003edev-\u003enpinfo, ignoring\n refcnt.\n - It basically calls `RCU_INIT_POINTER(np-\u003edev-\u003enpinfo, NULL);`\n - Set dev-\u003enpinfo = NULL, without proper cleanup\n - No -\u003endo_netpoll_cleanup() is either called\n\n4) Now the second target tries to clean up\n - The second cleanup fails because np-\u003edev-\u003enpinfo is already NULL.\n * In this case, ops-\u003endo_netpoll_cleanup() was never called, and\n the skb pool is not cleaned as well (for the second netpoll\n instance)\n - This leaks npinfo and skbpool skbs, which is clearly reported by\n kmemleak.\n\nRevert commit efa95b01da18 (\"netpoll: fix use after free\") and adds\nclarifying comments emphasizing that npinfo cleanup should only happen\nonce the refcount reaches zero, ensuring stable and correct netpoll\nbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68245",
"url": "https://www.suse.com/security/cve/CVE-2025-68245"
},
{
"category": "external",
"summary": "SUSE Bug 1255268 for CVE-2025-68245",
"url": "https://bugzilla.suse.com/1255268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68245"
},
{
"cve": "CVE-2025-68254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing\n\nThe Extended Supported Rates (ESR) IE handling in OnBeacon accessed\n*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these\noffsets lie within the received frame buffer. A malformed beacon with\nan ESR IE positioned at the end of the buffer could cause an\nout-of-bounds read, potentially triggering a kernel panic.\n\nAdd a boundary check to ensure that the ESR IE body and the subsequent\nbytes are within the limits of the frame before attempting to access\nthem.\n\nThis prevents OOB reads caused by malformed beacon frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68254",
"url": "https://www.suse.com/security/cve/CVE-2025-68254"
},
{
"category": "external",
"summary": "SUSE Bug 1255140 for CVE-2025-68254",
"url": "https://bugzilla.suse.com/1255140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68254"
},
{
"cve": "CVE-2025-68256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68256"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser\n\nThe Information Element (IE) parser rtw_get_ie() trusted the length\nbyte of each IE without validating that the IE body (len bytes after\nthe 2-byte header) fits inside the remaining frame buffer. A malformed\nframe can advertise an IE length larger than the available data, causing\nthe parser to increment its pointer beyond the buffer end. This results\nin out-of-bounds reads or, depending on the pattern, an infinite loop.\n\nFix by validating that (offset + 2 + len) does not exceed the limit\nbefore accepting the IE or advancing to the next element.\n\nThis prevents OOB reads and ensures the parser terminates safely on\nmalformed frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68256",
"url": "https://www.suse.com/security/cve/CVE-2025-68256"
},
{
"category": "external",
"summary": "SUSE Bug 1255138 for CVE-2025-68256",
"url": "https://bugzilla.suse.com/1255138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68256"
},
{
"cve": "CVE-2025-68261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n \u003cTASK\u003e\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68261",
"url": "https://www.suse.com/security/cve/CVE-2025-68261"
},
{
"category": "external",
"summary": "SUSE Bug 1255164 for CVE-2025-68261",
"url": "https://bugzilla.suse.com/1255164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68261"
},
{
"cve": "CVE-2025-68284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: prevent potential out-of-bounds writes in handle_auth_session_key()\n\nThe len field originates from untrusted network packets. Boundary\nchecks have been added to prevent potential out-of-bounds writes when\ndecrypting the connection secret or processing service tickets.\n\n[ idryomov: changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68284",
"url": "https://www.suse.com/security/cve/CVE-2025-68284"
},
{
"category": "external",
"summary": "SUSE Bug 1255377 for CVE-2025-68284",
"url": "https://bugzilla.suse.com/1255377"
},
{
"category": "external",
"summary": "SUSE Bug 1255378 for CVE-2025-68284",
"url": "https://bugzilla.suse.com/1255378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-68284"
},
{
"cve": "CVE-2025-68285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68285"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix potential use-after-free in have_mon_and_osd_map()\n\nThe wait loop in __ceph_open_session() can race with the client\nreceiving a new monmap or osdmap shortly after the initial map is\nreceived. Both ceph_monc_handle_map() and handle_one_map() install\na new map immediately after freeing the old one\n\n kfree(monc-\u003emonmap);\n monc-\u003emonmap = monmap;\n\n ceph_osdmap_destroy(osdc-\u003eosdmap);\n osdc-\u003eosdmap = newmap;\n\nunder client-\u003emonc.mutex and client-\u003eosdc.lock respectively, but\nbecause neither is taken in have_mon_and_osd_map() it\u0027s possible for\nclient-\u003emonc.monmap-\u003eepoch and client-\u003eosdc.osdmap-\u003eepoch arms in\n\n client-\u003emonc.monmap \u0026\u0026 client-\u003emonc.monmap-\u003eepoch \u0026\u0026\n client-\u003eosdc.osdmap \u0026\u0026 client-\u003eosdc.osdmap-\u003eepoch;\n\ncondition to dereference an already freed map. This happens to be\nreproducible with generic/395 and generic/397 with KASAN enabled:\n\n BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70\n Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305\n CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266\n ...\n Call Trace:\n \u003cTASK\u003e\n have_mon_and_osd_map+0x56/0x70\n ceph_open_session+0x182/0x290\n ceph_get_tree+0x333/0x680\n vfs_get_tree+0x49/0x180\n do_new_mount+0x1a3/0x2d0\n path_mount+0x6dd/0x730\n do_mount+0x99/0xe0\n __do_sys_mount+0x141/0x180\n do_syscall_64+0x9f/0x100\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\n Allocated by task 13305:\n ceph_osdmap_alloc+0x16/0x130\n ceph_osdc_init+0x27a/0x4c0\n ceph_create_client+0x153/0x190\n create_fs_client+0x50/0x2a0\n ceph_get_tree+0xff/0x680\n vfs_get_tree+0x49/0x180\n do_new_mount+0x1a3/0x2d0\n path_mount+0x6dd/0x730\n do_mount+0x99/0xe0\n __do_sys_mount+0x141/0x180\n do_syscall_64+0x9f/0x100\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n Freed by task 9475:\n kfree+0x212/0x290\n handle_one_map+0x23c/0x3b0\n ceph_osdc_handle_map+0x3c9/0x590\n mon_dispatch+0x655/0x6f0\n ceph_con_process_message+0xc3/0xe0\n ceph_con_v1_try_read+0x614/0x760\n ceph_con_workfn+0x2de/0x650\n process_one_work+0x486/0x7c0\n process_scheduled_works+0x73/0x90\n worker_thread+0x1c8/0x2a0\n kthread+0x2ec/0x300\n ret_from_fork+0x24/0x40\n ret_from_fork_asm+0x1a/0x30\n\nRewrite the wait loop to check the above condition directly with\nclient-\u003emonc.mutex and client-\u003eosdc.lock taken as appropriate. While\nat it, improve the timeout handling (previously mount_timeout could be\nexceeded in case wait_event_interruptible_timeout() slept more than\nonce) and access client-\u003eauth_err under client-\u003emonc.mutex to match\nhow it\u0027s set in finish_auth().\n\nmonmap_show() and osdmap_show() now take the respective lock before\naccessing the map as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68285",
"url": "https://www.suse.com/security/cve/CVE-2025-68285"
},
{
"category": "external",
"summary": "SUSE Bug 1255401 for CVE-2025-68285",
"url": "https://bugzilla.suse.com/1255401"
},
{
"category": "external",
"summary": "SUSE Bug 1255402 for CVE-2025-68285",
"url": "https://bugzilla.suse.com/1255402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-68285"
},
{
"cve": "CVE-2025-68296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68296"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup\n\nProtect vga_switcheroo_client_fb_set() with console lock. Avoids OOB\naccess in fbcon_remap_all(). Without holding the console lock the call\nraces with switching outputs.\n\nVGA switcheroo calls fbcon_remap_all() when switching clients. The fbcon\nfunction uses struct fb_info.node, which is set by register_framebuffer().\nAs the fb-helper code currently sets up VGA switcheroo before registering\nthe framebuffer, the value of node is -1 and therefore not a legal value.\nFor example, fbcon uses the value within set_con2fb_map() [1] as an index\ninto an array.\n\nMoving vga_switcheroo_client_fb_set() after register_framebuffer() can\nresult in VGA switching that does not switch fbcon correctly.\n\nTherefore move vga_switcheroo_client_fb_set() under fbcon_fb_registered(),\nwhich already holds the console lock. Fbdev calls fbcon_fb_registered()\nfrom within register_framebuffer(). Serializes the helper with VGA\nswitcheroo\u0027s call to fbcon_remap_all().\n\nAlthough vga_switcheroo_client_fb_set() takes an instance of struct fb_info\nas parameter, it really only needs the contained fbcon state. Moving the\ncall to fbcon initialization is therefore cleaner than before. Only amdgpu,\ni915, nouveau and radeon support vga_switcheroo. For all other drivers,\nthis change does nothing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68296",
"url": "https://www.suse.com/security/cve/CVE-2025-68296"
},
{
"category": "external",
"summary": "SUSE Bug 1255128 for CVE-2025-68296",
"url": "https://bugzilla.suse.com/1255128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68296"
},
{
"cve": "CVE-2025-68297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68297"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix crash in process_v2_sparse_read() for encrypted directories\n\nThe crash in process_v2_sparse_read() for fscrypt-encrypted directories\nhas been reported. Issue takes place for Ceph msgr2 protocol in secure\nmode. It can be reproduced by the steps:\n\nsudo mount -t ceph :/ /mnt/cephfs/ -o name=admin,fs=cephfs,ms_mode=secure\n\n(1) mkdir /mnt/cephfs/fscrypt-test-3\n(2) cp area_decrypted.tar /mnt/cephfs/fscrypt-test-3\n(3) fscrypt encrypt --source=raw_key --key=./my.key /mnt/cephfs/fscrypt-test-3\n(4) fscrypt lock /mnt/cephfs/fscrypt-test-3\n(5) fscrypt unlock --key=my.key /mnt/cephfs/fscrypt-test-3\n(6) cat /mnt/cephfs/fscrypt-test-3/area_decrypted.tar\n(7) Issue has been triggered\n\n[ 408.072247] ------------[ cut here ]------------\n[ 408.072251] WARNING: CPU: 1 PID: 392 at net/ceph/messenger_v2.c:865\nceph_con_v2_try_read+0x4b39/0x72f0\n[ 408.072267] Modules linked in: intel_rapl_msr intel_rapl_common\nintel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_discovery\npmt_class intel_pmc_ssram_telemetry intel_vsec kvm_intel joydev kvm irqbypass\npolyval_clmulni ghash_clmulni_intel aesni_intel rapl input_leds psmouse\nserio_raw i2c_piix4 vga16fb bochs vgastate i2c_smbus floppy mac_hid qemu_fw_cfg\npata_acpi sch_fq_codel rbd msr parport_pc ppdev lp parport efi_pstore\n[ 408.072304] CPU: 1 UID: 0 PID: 392 Comm: kworker/1:3 Not tainted 6.17.0-rc7+\n[ 408.072307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.17.0-5.fc42 04/01/2014\n[ 408.072310] Workqueue: ceph-msgr ceph_con_workfn\n[ 408.072314] RIP: 0010:ceph_con_v2_try_read+0x4b39/0x72f0\n[ 408.072317] Code: c7 c1 20 f0 d4 ae 50 31 d2 48 c7 c6 60 27 d5 ae 48 c7 c7 f8\n8e 6f b0 68 60 38 d5 ae e8 00 47 61 fe 48 83 c4 18 e9 ac fc ff ff \u003c0f\u003e 0b e9 06\nfe ff ff 4c 8b 9d 98 fd ff ff 0f 84 64 e7 ff ff 89 85\n[ 408.072319] RSP: 0018:ffff88811c3e7a30 EFLAGS: 00010246\n[ 408.072322] RAX: ffffed1024874c6f RBX: ffffea00042c2b40 RCX: 0000000000000f38\n[ 408.072324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 408.072325] RBP: ffff88811c3e7ca8 R08: 0000000000000000 R09: 00000000000000c8\n[ 408.072326] R10: 00000000000000c8 R11: 0000000000000000 R12: 00000000000000c8\n[ 408.072327] R13: dffffc0000000000 R14: ffff8881243a6030 R15: 0000000000003000\n[ 408.072329] FS: 0000000000000000(0000) GS:ffff88823eadf000(0000)\nknlGS:0000000000000000\n[ 408.072331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 408.072332] CR2: 000000c0003c6000 CR3: 000000010c106005 CR4: 0000000000772ef0\n[ 408.072336] PKRU: 55555554\n[ 408.072337] Call Trace:\n[ 408.072338] \u003cTASK\u003e\n[ 408.072340] ? sched_clock_noinstr+0x9/0x10\n[ 408.072344] ? __pfx_ceph_con_v2_try_read+0x10/0x10\n[ 408.072347] ? _raw_spin_unlock+0xe/0x40\n[ 408.072349] ? finish_task_switch.isra.0+0x15d/0x830\n[ 408.072353] ? __kasan_check_write+0x14/0x30\n[ 408.072357] ? mutex_lock+0x84/0xe0\n[ 408.072359] ? __pfx_mutex_lock+0x10/0x10\n[ 408.072361] ceph_con_workfn+0x27e/0x10e0\n[ 408.072364] ? metric_delayed_work+0x311/0x2c50\n[ 408.072367] process_one_work+0x611/0xe20\n[ 408.072371] ? __kasan_check_write+0x14/0x30\n[ 408.072373] worker_thread+0x7e3/0x1580\n[ 408.072375] ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 408.072378] ? __pfx_worker_thread+0x10/0x10\n[ 408.072381] kthread+0x381/0x7a0\n[ 408.072383] ? __pfx__raw_spin_lock_irq+0x10/0x10\n[ 408.072385] ? __pfx_kthread+0x10/0x10\n[ 408.072387] ? __kasan_check_write+0x14/0x30\n[ 408.072389] ? recalc_sigpending+0x160/0x220\n[ 408.072392] ? _raw_spin_unlock_irq+0xe/0x50\n[ 408.072394] ? calculate_sigpending+0x78/0xb0\n[ 408.072395] ? __pfx_kthread+0x10/0x10\n[ 408.072397] ret_from_fork+0x2b6/0x380\n[ 408.072400] ? __pfx_kthread+0x10/0x10\n[ 408.072402] ret_from_fork_asm+0x1a/0x30\n[ 408.072406] \u003c/TASK\u003e\n[ 408.072407] ---[ end trace 0000000000000000 ]---\n[ 408.072418] Oops: general protection fault, probably for non-canonical\naddress 0xdffffc00000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68297",
"url": "https://www.suse.com/security/cve/CVE-2025-68297"
},
{
"category": "external",
"summary": "SUSE Bug 1255403 for CVE-2025-68297",
"url": "https://bugzilla.suse.com/1255403"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68297"
},
{
"cve": "CVE-2025-68301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix fragment overflow handling in RX path\n\nThe atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)\nfragments when handling large multi-descriptor packets. This causes an\nout-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.\n\nThe issue occurs because the driver doesn\u0027t check the total number of\nfragments before calling skb_add_rx_frag(). When a packet requires more\nthan MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.\n\nFix by assuming there will be an extra frag if buff-\u003elen \u003e AQ_CFG_RX_HDR_SIZE,\nthen all fragments are accounted for. And reusing the existing check to\nprevent the overflow earlier in the code path.\n\nThis crash occurred in production with an Aquantia AQC113 10G NIC.\n\nStack trace from production environment:\n```\nRIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0\nCode: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89\nca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90\nc8 00 00 00 \u003c48\u003e 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48\n89 fa 83\nRSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287\nRAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:\nfffffffe0a0c8000\nRDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:\n0000000000037a40\nRBP: 0000000000000024 R08: 0000000000000000 R09:\n0000000000000021\nR10: 0000000000000848 R11: 0000000000000000 R12:\nffffa9bec02a8e24\nR13: ffff925ad8615570 R14: 0000000000000000 R15:\nffff925b22e80a00\nFS: 0000000000000000(0000)\nGS:ffff925e47880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:\n0000000000f72ef0\nPKRU: 55555554\nCall Trace:\n\u003cIRQ\u003e\naq_ring_rx_clean+0x175/0xe60 [atlantic]\n? aq_ring_rx_clean+0x14d/0xe60 [atlantic]\n? aq_ring_tx_clean+0xdf/0x190 [atlantic]\n? kmem_cache_free+0x348/0x450\n? aq_vec_poll+0x81/0x1d0 [atlantic]\n? __napi_poll+0x28/0x1c0\n? net_rx_action+0x337/0x420\n```\n\nChanges in v4:\n- Add Fixes: tag to satisfy patch validation requirements.\n\nChanges in v3:\n- Fix by assuming there will be an extra frag if buff-\u003elen \u003e AQ_CFG_RX_HDR_SIZE,\n then all fragments are accounted for.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68301",
"url": "https://www.suse.com/security/cve/CVE-2025-68301"
},
{
"category": "external",
"summary": "SUSE Bug 1255120 for CVE-2025-68301",
"url": "https://bugzilla.suse.com/1255120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68301"
},
{
"cve": "CVE-2025-68320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68320"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlan966x: Fix sleeping in atomic context\n\nThe following warning was seen when we try to connect using ssh to the device.\n\nBUG: sleeping function called from invalid context at kernel/locking/mutex.c:575\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear\npreempt_count: 1, expected: 0\nINFO: lockdep is turned off.\nCPU: 0 UID: 0 PID: 104 Comm: dropbear Tainted: G W 6.18.0-rc2-00399-g6f1ab1b109b9-dirty #530 NONE\nTainted: [W]=WARN\nHardware name: Generic DT based system\nCall trace:\n unwind_backtrace from show_stack+0x10/0x14\n show_stack from dump_stack_lvl+0x7c/0xac\n dump_stack_lvl from __might_resched+0x16c/0x2b0\n __might_resched from __mutex_lock+0x64/0xd34\n __mutex_lock from mutex_lock_nested+0x1c/0x24\n mutex_lock_nested from lan966x_stats_get+0x5c/0x558\n lan966x_stats_get from dev_get_stats+0x40/0x43c\n dev_get_stats from dev_seq_printf_stats+0x3c/0x184\n dev_seq_printf_stats from dev_seq_show+0x10/0x30\n dev_seq_show from seq_read_iter+0x350/0x4ec\n seq_read_iter from seq_read+0xfc/0x194\n seq_read from proc_reg_read+0xac/0x100\n proc_reg_read from vfs_read+0xb0/0x2b0\n vfs_read from ksys_read+0x6c/0xec\n ksys_read from ret_fast_syscall+0x0/0x1c\nException stack(0xf0b11fa8 to 0xf0b11ff0)\n1fa0: 00000001 00001000 00000008 be9048d8 00001000 00000001\n1fc0: 00000001 00001000 00000008 00000003 be905920 0000001e 00000000 00000001\n1fe0: 0005404c be9048c0 00018684 b6ec2cd8\n\nIt seems that we are using a mutex in a atomic context which is wrong.\nChange the mutex with a spinlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68320",
"url": "https://www.suse.com/security/cve/CVE-2025-68320"
},
{
"category": "external",
"summary": "SUSE Bug 1255172 for CVE-2025-68320",
"url": "https://bugzilla.suse.com/1255172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68320"
},
{
"cve": "CVE-2025-68325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68325"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_cake: Fix incorrect qlen reduction in cake_drop\n\nIn cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen\nand backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes\nthat the parent qdisc will enqueue the current packet. However, this\nassumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent\nqdisc stops enqueuing current packet, leaving the tree qlen/backlog\naccounting inconsistent. This mismatch can lead to a NULL dereference\n(e.g., when the parent Qdisc is qfq_qdisc).\n\nThis patch computes the qlen/backlog delta in a more robust way by\nobserving the difference before and after the series of cake_drop()\ncalls, and then compensates the qdisc tree accounting if cake_enqueue()\nreturns NET_XMIT_CN.\n\nTo ensure correct compensation when ACK thinning is enabled, a new\nvariable is introduced to keep qlen unchanged.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68325",
"url": "https://www.suse.com/security/cve/CVE-2025-68325"
},
{
"category": "external",
"summary": "SUSE Bug 1255417 for CVE-2025-68325",
"url": "https://bugzilla.suse.com/1255417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68325"
},
{
"cve": "CVE-2025-68327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68327"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas_usbhs: Fix synchronous external abort on unbind\n\nA synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is\nexecuted after the configuration sequence described above:\n\nmodprobe usb_f_ecm\nmodprobe libcomposite\nmodprobe configfs\ncd /sys/kernel/config/usb_gadget\nmkdir -p g1\ncd g1\necho \"0x1d6b\" \u003e idVendor\necho \"0x0104\" \u003e idProduct\nmkdir -p strings/0x409\necho \"0123456789\" \u003e strings/0x409/serialnumber\necho \"Renesas.\" \u003e strings/0x409/manufacturer\necho \"Ethernet Gadget\" \u003e strings/0x409/product\nmkdir -p functions/ecm.usb0\nmkdir -p configs/c.1\nmkdir -p configs/c.1/strings/0x409\necho \"ECM\" \u003e configs/c.1/strings/0x409/configuration\n\nif [ ! -L configs/c.1/ecm.usb0 ]; then\n ln -s functions/ecm.usb0 configs/c.1\nfi\n\necho 11e20000.usb \u003e UDC\necho 11e20000.usb \u003e /sys/bus/platform/drivers/renesas_usbhs/unbind\n\nThe displayed trace is as follows:\n\n Internal error: synchronous external abort: 0000000096000010 [#1] SMP\n CPU: 0 UID: 0 PID: 188 Comm: sh Tainted: G M 6.17.0-rc7-next-20250922-00010-g41050493b2bd #55 PREEMPT\n Tainted: [M]=MACHINE_CHECK\n Hardware name: Renesas SMARC EVK version 2 based on r9a08g045s33 (DT)\n pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs]\n lr : usbhsg_update_pullup+0x3c/0x68 [renesas_usbhs]\n sp : ffff8000838b3920\n x29: ffff8000838b3920 x28: ffff00000d585780 x27: 0000000000000000\n x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000c3e3810\n x23: ffff00000d5e5c80 x22: ffff00000d5e5d40 x21: 0000000000000000\n x20: 0000000000000000 x19: ffff00000d5e5c80 x18: 0000000000000020\n x17: 2e30303230316531 x16: 312d7968703a7968 x15: 3d454d414e5f4344\n x14: 000000000000002c x13: 0000000000000000 x12: 0000000000000000\n x11: ffff00000f358f38 x10: ffff00000f358db0 x9 : ffff00000b41f418\n x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d\n x5 : 8080808000000000 x4 : 000000004b5ccb9d x3 : 0000000000000000\n x2 : 0000000000000000 x1 : ffff800083790000 x0 : ffff00000d5e5c80\n Call trace:\n usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs] (P)\n usbhsg_pullup+0x4c/0x7c [renesas_usbhs]\n usb_gadget_disconnect_locked+0x48/0xd4\n gadget_unbind_driver+0x44/0x114\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1c8/0x224\n device_release_driver+0x18/0x24\n bus_remove_device+0xcc/0x10c\n device_del+0x14c/0x404\n usb_del_gadget+0x88/0xc0\n usb_del_gadget_udc+0x18/0x30\n usbhs_mod_gadget_remove+0x24/0x44 [renesas_usbhs]\n usbhs_mod_remove+0x20/0x30 [renesas_usbhs]\n usbhs_remove+0x98/0xdc [renesas_usbhs]\n platform_remove+0x20/0x30\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1c8/0x224\n device_driver_detach+0x18/0x24\n unbind_store+0xb4/0xb8\n drv_attr_store+0x24/0x38\n sysfs_kf_write+0x7c/0x94\n kernfs_fop_write_iter+0x128/0x1b8\n vfs_write+0x2ac/0x350\n ksys_write+0x68/0xfc\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: 7100003f 1a9f07e1 531c6c22 f9400001 (79400021)\n ---[ end trace 0000000000000000 ]---\n note: sh[188] exited with irqs disabled\n note: sh[188] exited with preempt_count 1\n\nThe issue occurs because usbhs_sys_function_pullup(), which accesses the IP\nregisters, is executed after the USBHS clocks have been disabled. The\nproblem is reproducible on the Renesas RZ/G3S SoC starting with the\naddition of module stop in the clock enable/disable APIs. With module stop\nfunctionality enabled, a bus error is expected if a master accesses a\nmodule whose clock has been stopped and module stop activated.\n\nDisable the IP clocks at the end of remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68327",
"url": "https://www.suse.com/security/cve/CVE-2025-68327"
},
{
"category": "external",
"summary": "SUSE Bug 1255488 for CVE-2025-68327",
"url": "https://bugzilla.suse.com/1255488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68327"
},
{
"cve": "CVE-2025-68337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted\n\nThere\u0027s issue when file system corrupted:\n------------[ cut here ]------------\nkernel BUG at fs/jbd2/transaction.c:1289!\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next\nRIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0\nRSP: 0018:ffff888117aafa30 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534\nRDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010\nRBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028\nR10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __ext4_journal_get_create_access+0x42/0x170\n ext4_getblk+0x319/0x6f0\n ext4_bread+0x11/0x100\n ext4_append+0x1e6/0x4a0\n ext4_init_new_dir+0x145/0x1d0\n ext4_mkdir+0x326/0x920\n vfs_mkdir+0x45c/0x740\n do_mkdirat+0x234/0x2f0\n __x64_sys_mkdir+0xd6/0x120\n do_syscall_64+0x5f/0xfa0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue occurs with us in errors=continue mode when accompanied by\nstorage failures. There have been many inconsistencies in the file system\ndata.\nIn the case of file system data inconsistency, for example, if the block\nbitmap of a referenced block is not set, it can lead to the situation where\na block being committed is allocated and used again. As a result, the\nfollowing condition will not be satisfied then trigger BUG_ON. Of course,\nit is entirely possible to construct a problematic image that can trigger\nthis BUG_ON through specific operations. In fact, I have constructed such\nan image and easily reproduced this issue.\nTherefore, J_ASSERT() holds true only under ideal conditions, but it may\nnot necessarily be satisfied in exceptional scenarios. Using J_ASSERT()\ndirectly in abnormal situations would cause the system to crash, which is\nclearly not what we want. So here we directly trigger a JBD abort instead\nof immediately invoking BUG_ON.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68337",
"url": "https://www.suse.com/security/cve/CVE-2025-68337"
},
{
"category": "external",
"summary": "SUSE Bug 1255482 for CVE-2025-68337",
"url": "https://bugzilla.suse.com/1255482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68337"
},
{
"cve": "CVE-2025-68349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n -\u003e nfs4_write_inode\n -\u003e pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68349",
"url": "https://www.suse.com/security/cve/CVE-2025-68349"
},
{
"category": "external",
"summary": "SUSE Bug 1255544 for CVE-2025-68349",
"url": "https://bugzilla.suse.com/1255544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68349"
},
{
"cve": "CVE-2025-68363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu\n\nThe bpf_skb_check_mtu helper needs to use skb-\u003etransport_header when\nthe BPF_MTU_CHK_SEGS flag is used:\n\n\tbpf_skb_check_mtu(skb, ifindex, \u0026mtu_len, 0, BPF_MTU_CHK_SEGS)\n\nThe transport_header is not always set. There is a WARN_ON_ONCE\nreport when CONFIG_DEBUG_NET is enabled + skb-\u003egso_size is set +\nbpf_prog_test_run is used:\n\nWARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071\n skb_gso_validate_network_len\n bpf_skb_check_mtu\n bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch\n bpf_test_run\n bpf_prog_test_run_skb\n\nFor a normal ingress skb (not test_run), skb_reset_transport_header\nis performed but there is plan to avoid setting it as described in\ncommit 2170a1f09148 (\"net: no longer reset transport_header in __netif_receive_skb_core()\").\n\nThis patch fixes the bpf helper by checking\nskb_transport_header_was_set(). The check is done just before\nskb-\u003etransport_header is used, to avoid breaking the existing bpf prog.\nThe WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68363",
"url": "https://www.suse.com/security/cve/CVE-2025-68363"
},
{
"category": "external",
"summary": "SUSE Bug 1255552 for CVE-2025-68363",
"url": "https://bugzilla.suse.com/1255552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68363"
},
{
"cve": "CVE-2025-68365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68365"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Initialize allocated memory before use\n\nKMSAN reports: Multiple uninitialized values detected:\n\n- KMSAN: uninit-value in ntfs_read_hdr (3)\n- KMSAN: uninit-value in bcmp (3)\n\nMemory is allocated by __getname(), which is a wrapper for\nkmem_cache_alloc(). This memory is used before being properly\ncleared. Change kmem_cache_alloc() to kmem_cache_zalloc() to\nproperly allocate and clear memory before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68365",
"url": "https://www.suse.com/security/cve/CVE-2025-68365"
},
{
"category": "external",
"summary": "SUSE Bug 1255548 for CVE-2025-68365",
"url": "https://bugzilla.suse.com/1255548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68365"
},
{
"cve": "CVE-2025-68366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68366"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config unlock in nbd_genl_connect\n\nThere is one use-after-free warning when running NBD_CMD_CONNECT and\nNBD_CLEAR_SOCK:\n\nnbd_genl_connect\n nbd_alloc_and_init_config // config_refs=1\n nbd_start_device // config_refs=2\n set NBD_RT_HAS_CONFIG_REF\t\t\topen nbd // config_refs=3\n recv_work done // config_refs=2\n\t\t\t\t\t\tNBD_CLEAR_SOCK // config_refs=1\n\t\t\t\t\t\tclose nbd // config_refs=0\n refcount_inc -\u003e uaf\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290\n nbd_genl_connect+0x16d0/0x1ab0\n genl_family_rcv_msg_doit+0x1f3/0x310\n genl_rcv_msg+0x44a/0x790\n\nThe issue can be easily reproduced by adding a small delay before\nrefcount_inc(\u0026nbd-\u003econfig_refs) in nbd_genl_connect():\n\n mutex_unlock(\u0026nbd-\u003econfig_lock);\n if (!ret) {\n set_bit(NBD_RT_HAS_CONFIG_REF, \u0026config-\u003eruntime_flags);\n+ printk(\"before sleep\\n\");\n+ mdelay(5 * 1000);\n+ printk(\"after sleep\\n\");\n refcount_inc(\u0026nbd-\u003econfig_refs);\n nbd_connect_reply(info, nbd-\u003eindex);\n }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68366",
"url": "https://www.suse.com/security/cve/CVE-2025-68366"
},
{
"category": "external",
"summary": "SUSE Bug 1255622 for CVE-2025-68366",
"url": "https://bugzilla.suse.com/1255622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68366"
},
{
"cve": "CVE-2025-68367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68367"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse\n\nThe following warning appears when running syzkaller, and this issue also\nexists in the mainline code.\n\n ------------[ cut here ]------------\n list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.\n WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130\n Modules linked in:\n CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__list_add_valid_or_report+0xf7/0x130\n RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817\n RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001\n RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c\n R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100\n R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48\n FS: 00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 80000000\n Call Trace:\n \u003cTASK\u003e\n input_register_handler+0xb3/0x210\n mac_hid_start_emulation+0x1c5/0x290\n mac_hid_toggle_emumouse+0x20a/0x240\n proc_sys_call_handler+0x4c2/0x6e0\n new_sync_write+0x1b1/0x2d0\n vfs_write+0x709/0x950\n ksys_write+0x12a/0x250\n do_syscall_64+0x5a/0x110\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe WARNING occurs when two processes concurrently write to the mac-hid\nemulation sysctl, causing a race condition in mac_hid_toggle_emumouse().\nBoth processes read old_val=0, then both try to register the input handler,\nleading to a double list_add of the same handler.\n\n CPU0 CPU1\n ------------------------- -------------------------\n vfs_write() //write 1 vfs_write() //write 1\n proc_sys_write() proc_sys_write()\n mac_hid_toggle_emumouse() mac_hid_toggle_emumouse()\n old_val = *valp // old_val=0\n old_val = *valp // old_val=0\n mutex_lock_killable()\n proc_dointvec() // *valp=1\n mac_hid_start_emulation()\n input_register_handler()\n mutex_unlock()\n mutex_lock_killable()\n proc_dointvec()\n mac_hid_start_emulation()\n input_register_handler() //Trigger Warning\n mutex_unlock()\n\nFix this by moving the old_val read inside the mutex lock region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68367",
"url": "https://www.suse.com/security/cve/CVE-2025-68367"
},
{
"category": "external",
"summary": "SUSE Bug 1255547 for CVE-2025-68367",
"url": "https://bugzilla.suse.com/1255547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68367"
},
{
"cve": "CVE-2025-68372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config put in recv_work\n\nThere is one uaf issue in recv_work when running NBD_CLEAR_SOCK and\nNBD_CMD_RECONFIGURE:\n nbd_genl_connect // conf_ref=2 (connect and recv_work A)\n nbd_open\t // conf_ref=3\n recv_work A done // conf_ref=2\n NBD_CLEAR_SOCK // conf_ref=1\n nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)\n close nbd\t // conf_ref=1\n recv_work B\n config_put // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nOr only running NBD_CLEAR_SOCK:\n nbd_genl_connect // conf_ref=2\n nbd_open \t // conf_ref=3\n NBD_CLEAR_SOCK // conf_ref=2\n close nbd\n nbd_release\n config_put // conf_ref=1\n recv_work\n config_put \t // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nCommit 87aac3a80af5 (\"nbd: call nbd_config_put() before notifying the\nwaiter\") moved nbd_config_put() to run before waking up the waiter in\nrecv_work, in order to ensure that nbd_start_device_ioctl() would not\nbe woken up while nbd-\u003etask_recv was still uncleared.\n\nHowever, in nbd_start_device_ioctl(), after being woken up it explicitly\ncalls flush_workqueue() to make sure all current works are finished.\nTherefore, there is no need to move the config put ahead of the wakeup.\n\nMove nbd_config_put() to the end of recv_work, so that the reference is\nheld for the whole lifetime of the worker thread. This makes sure the\nconfig cannot be freed while recv_work is still running, even if clear\n+ reconfigure interleave.\n\nIn addition, we don\u0027t need to worry about recv_work dropping the last\nnbd_put (which causes deadlock):\n\npath A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=1 (trigger recv_work)\n open nbd // nbd_refs=2\n NBD_CLEAR_SOCK\n close nbd\n nbd_release\n nbd_disconnect_and_put\n flush_workqueue // recv_work done\n nbd_config_put\n nbd_put // nbd_refs=1\n nbd_put // nbd_refs=0\n queue_work\n\npath B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=2 (trigger recv_work)\n open nbd // nbd_refs=3\n NBD_CLEAR_SOCK // conf_refs=2\n close nbd\n nbd_release\n nbd_config_put // conf_refs=1\n nbd_put // nbd_refs=2\n recv_work done // conf_refs=0, nbd_refs=1\n rmmod // nbd_refs=0\n\nDepends-on: e2daec488c57 (\"nbd: Fix hungtask when nbd_config_put\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68372",
"url": "https://www.suse.com/security/cve/CVE-2025-68372"
},
{
"category": "external",
"summary": "SUSE Bug 1255537 for CVE-2025-68372",
"url": "https://bugzilla.suse.com/1255537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68372"
},
{
"cve": "CVE-2025-68379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure\n\nA NULL pointer dereference can occur in rxe_srq_chk_attr() when\nibv_modify_srq() is invoked twice in succession under certain error\nconditions. The first call may fail in rxe_queue_resize(), which leads\nrxe_srq_from_attr() to set srq-\u003erq.queue = NULL. The second call then\ntriggers a crash (null deref) when accessing\nsrq-\u003erq.queue-\u003ebuf-\u003eindex_mask.\n\nCall Trace:\n\u003cTASK\u003e\nrxe_modify_srq+0x170/0x480 [rdma_rxe]\n? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]\n? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]\n? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]\nib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]\n? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]\n? tryinc_node_nr_active+0xe6/0x150\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\nib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]\n? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]\n? __pfx___raw_spin_lock_irqsave+0x10/0x10\n? __pfx_do_vfs_ioctl+0x10/0x10\n? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0\n? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10\nib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]\n? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]\n__x64_sys_ioctl+0x138/0x1c0\ndo_syscall_64+0x82/0x250\n? fdget_pos+0x58/0x4c0\n? ksys_write+0xf3/0x1c0\n? __pfx_ksys_write+0x10/0x10\n? do_syscall_64+0xc8/0x250\n? __pfx_vm_mmap_pgoff+0x10/0x10\n? fget+0x173/0x230\n? fput+0x2a/0x80\n? ksys_mmap_pgoff+0x224/0x4c0\n? do_syscall_64+0xc8/0x250\n? do_user_addr_fault+0x37b/0xfe0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68379",
"url": "https://www.suse.com/security/cve/CVE-2025-68379"
},
{
"category": "external",
"summary": "SUSE Bug 1255695 for CVE-2025-68379",
"url": "https://bugzilla.suse.com/1255695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68379"
},
{
"cve": "CVE-2025-68725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68725"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Do not let BPF test infra emit invalid GSO types to stack\n\nYinhao et al. reported that their fuzzer tool was able to trigger a\nskb_warn_bad_offload() from netif_skb_features() -\u003e gso_features_check().\nWhen a BPF program - triggered via BPF test infra - pushes the packet\nto the loopback device via bpf_clone_redirect() then mentioned offload\nwarning can be seen. GSO-related features are then rightfully disabled.\n\nWe get into this situation due to convert___skb_to_skb() setting\ngso_segs and gso_size but not gso_type. Technically, it makes sense\nthat this warning triggers since the GSO properties are malformed due\nto the gso_type. Potentially, the gso_type could be marked non-trustworthy\nthrough setting it at least to SKB_GSO_DODGY without any other specific\nassumptions, but that also feels wrong given we should not go further\ninto the GSO engine in the first place.\n\nThe checks were added in 121d57af308d (\"gso: validate gso_type in GSO\nhandlers\") because there were malicious (syzbot) senders that combine\na protocol with a non-matching gso_type. If we would want to drop such\npackets, gso_features_check() currently only returns feature flags via\nnetif_skb_features(), so one location for potentially dropping such skbs\ncould be validate_xmit_unreadable_skb(), but then otoh it would be\nan additional check in the fast-path for a very corner case. Given\nbpf_clone_redirect() is the only place where BPF test infra could emit\nsuch packets, lets reject them right there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68725",
"url": "https://www.suse.com/security/cve/CVE-2025-68725"
},
{
"category": "external",
"summary": "SUSE Bug 1255569 for CVE-2025-68725",
"url": "https://bugzilla.suse.com/1255569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68725"
},
{
"cve": "CVE-2025-68727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68727"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to \u0027de\u0027; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68727",
"url": "https://www.suse.com/security/cve/CVE-2025-68727"
},
{
"category": "external",
"summary": "SUSE Bug 1255568 for CVE-2025-68727",
"url": "https://bugzilla.suse.com/1255568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68727"
},
{
"cve": "CVE-2025-68728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: fix uninit memory after failed mi_read in mi_format_new\n\nFix a KMSAN un-init bug found by syzkaller.\n\nntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be\nuptodate. We do not bring the buffer uptodate before setting it as\nuptodate. If the buffer were to not be uptodate, it could mean adding a\nbuffer with un-init data to the mi record. Attempting to load that record\nwill trigger KMSAN.\n\nAvoid this by setting the buffer as uptodate, if it\u0027s not already, by\noverwriting it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68728",
"url": "https://www.suse.com/security/cve/CVE-2025-68728"
},
{
"category": "external",
"summary": "SUSE Bug 1255539 for CVE-2025-68728",
"url": "https://bugzilla.suse.com/1255539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68728"
},
{
"cve": "CVE-2025-68733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmack: fix bug: unprivileged task can create labels\n\nIf an unprivileged task is allowed to relabel itself\n(/smack/relabel-self is not empty),\nit can freely create new labels by writing their\nnames into own /proc/PID/attr/smack/current\n\nThis occurs because do_setattr() imports\nthe provided label in advance,\nbefore checking \"relabel-self\" list.\n\nThis change ensures that the \"relabel-self\" list\nis checked before importing the label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68733",
"url": "https://www.suse.com/security/cve/CVE-2025-68733"
},
{
"category": "external",
"summary": "SUSE Bug 1255615 for CVE-2025-68733",
"url": "https://bugzilla.suse.com/1255615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68733"
},
{
"cve": "CVE-2025-68764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68764"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags\n\nWhen a filesystem is being automounted, it needs to preserve the\nuser-set superblock mount options, such as the \"ro\" flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68764",
"url": "https://www.suse.com/security/cve/CVE-2025-68764"
},
{
"category": "external",
"summary": "SUSE Bug 1255930 for CVE-2025-68764",
"url": "https://bugzilla.suse.com/1255930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68764"
},
{
"cve": "CVE-2025-68768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: frags: flush pending skbs in fqdir_pre_exit()\n\nWe have been seeing occasional deadlocks on pernet_ops_rwsem since\nSeptember in NIPA. The stuck task was usually modprobe (often loading\na driver like ipvlan), trying to take the lock as a Writer.\nlockdep does not track readers for rwsems so the read wasn\u0027t obvious\nfrom the reports.\n\nOn closer inspection the Reader holding the lock was conntrack looping\nforever in nf_conntrack_cleanup_net_list(). Based on past experience\nwith occasional NIPA crashes I looked thru the tests which run before\nthe crash and noticed that the crash follows ip_defrag.sh. An immediate\nred flag. Scouring thru (de)fragmentation queues reveals skbs sitting\naround, holding conntrack references.\n\nThe problem is that since conntrack depends on nf_defrag_ipv6,\nnf_defrag_ipv6 will load first. Since nf_defrag_ipv6 loads first its\nnetns exit hooks run _after_ conntrack\u0027s netns exit hook.\n\nFlush all fragment queue SKBs during fqdir_pre_exit() to release\nconntrack references before conntrack cleanup runs. Also flush\nthe queues in timer expiry handlers when they discover fqdir-\u003edead\nis set, in case packet sneaks in while we\u0027re running the pre_exit\nflush.\n\nThe commit under Fixes is not exactly the culprit, but I think\npreviously the timer firing would eventually unblock the spinning\nconntrack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68768",
"url": "https://www.suse.com/security/cve/CVE-2025-68768"
},
{
"category": "external",
"summary": "SUSE Bug 1256579 for CVE-2025-68768",
"url": "https://bugzilla.suse.com/1256579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68768"
},
{
"cve": "CVE-2025-68770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68770"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix XDP_TX path\n\nFor XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not\ncorrect. __bnxt_poll_work() -\u003e bnxt_rx_pkt() -\u003e bnxt_rx_xdp() may be\nlooping within NAPI and some event flags may be set in earlier\niterations. In particular, if BNXT_TX_EVENT is set earlier indicating\nsome XDP_TX packets are ready and pending, it will be cleared if it is\nXDP_TX action again. Normally, we will set BNXT_TX_EVENT again when we\nsuccessfully call __bnxt_xmit_xdp(). But if the TX ring has no more\nroom, the flag will not be set. This will cause the TX producer to be\nahead but the driver will not hit the TX doorbell.\n\nFor multi-buf XDP_TX, there is no need to clear the event flags and set\nBNXT_AGG_EVENT. The BNXT_AGG_EVENT flag should have been set earlier in\nbnxt_rx_pkt().\n\nThe visible symptom of this is that the RX ring associated with the\nTX XDP ring will eventually become empty and all packets will be dropped.\nBecause this condition will cause the driver to not refill the RX ring\nseeing that the TX ring has forever pending XDP_TX packets.\n\nThe fix is to only clear BNXT_RX_EVENT when we have successfully\ncalled __bnxt_xmit_xdp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68770",
"url": "https://www.suse.com/security/cve/CVE-2025-68770"
},
{
"category": "external",
"summary": "SUSE Bug 1256584 for CVE-2025-68770",
"url": "https://bugzilla.suse.com/1256584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68770"
},
{
"cve": "CVE-2025-68771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix kernel BUG in ocfs2_find_victim_chain\n\nsyzbot reported a kernel BUG in ocfs2_find_victim_chain() because the\n`cl_next_free_rec` field of the allocation chain list (next free slot in\nthe chain list) is 0, triggring the BUG_ON(!cl-\u003ecl_next_free_rec)\ncondition in ocfs2_find_victim_chain() and panicking the kernel.\n\nTo fix this, an if condition is introduced in ocfs2_claim_suballoc_bits(),\njust before calling ocfs2_find_victim_chain(), the code block in it being\nexecuted when either of the following conditions is true:\n\n1. `cl_next_free_rec` is equal to 0, indicating that there are no free\nchains in the allocation chain list\n2. `cl_next_free_rec` is greater than `cl_count` (the total number of\nchains in the allocation chain list)\n\nEither of them being true is indicative of the fact that there are no\nchains left for usage.\n\nThis is addressed using ocfs2_error(), which prints\nthe error log for debugging purposes, rather than panicking the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68771",
"url": "https://www.suse.com/security/cve/CVE-2025-68771"
},
{
"category": "external",
"summary": "SUSE Bug 1256582 for CVE-2025-68771",
"url": "https://bugzilla.suse.com/1256582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68771"
},
{
"cve": "CVE-2025-68773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68773"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fsl-cpm: Check length parity before switching to 16 bit mode\n\nCommit fc96ec826bce (\"spi: fsl-cpm: Use 16 bit mode for large transfers\nwith even size\") failed to make sure that the size is really even\nbefore switching to 16 bit mode. Until recently the problem went\nunnoticed because kernfs uses a pre-allocated bounce buffer of size\nPAGE_SIZE for reading EEPROM.\n\nBut commit 8ad6249c51d0 (\"eeprom: at25: convert to spi-mem API\")\nintroduced an additional dynamically allocated bounce buffer whose size\nis exactly the size of the transfer, leading to a buffer overrun in\nthe fsl-cpm driver when that size is odd.\n\nAdd the missing length parity verification and remain in 8 bit mode\nwhen the length is not even.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68773",
"url": "https://www.suse.com/security/cve/CVE-2025-68773"
},
{
"category": "external",
"summary": "SUSE Bug 1256586 for CVE-2025-68773",
"url": "https://bugzilla.suse.com/1256586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68773"
},
{
"cve": "CVE-2025-68775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: duplicate handshake cancellations leak socket\n\nWhen a handshake request is cancelled it is removed from the\nhandshake_net-\u003ehn_requests list, but it is still present in the\nhandshake_rhashtbl until it is destroyed.\n\nIf a second cancellation request arrives for the same handshake request,\nthen remove_pending() will return false... and assuming\nHANDSHAKE_F_REQ_COMPLETED isn\u0027t set in req-\u003ehr_flags, we\u0027ll continue\nprocessing through the out_true label, where we put another reference on\nthe sock and a refcount underflow occurs.\n\nThis can happen for example if a handshake times out - particularly if\nthe SUNRPC client sends the AUTH_TLS probe to the server but doesn\u0027t\nfollow it up with the ClientHello due to a problem with tlshd. When the\ntimeout is hit on the server, the server will send a FIN, which triggers\na cancellation request via xs_reset_transport(). When the timeout is\nhit on the client, another cancellation request happens via\nxs_tls_handshake_sync().\n\nAdd a test_and_set_bit(HANDSHAKE_F_REQ_COMPLETED) in the pending cancel\npath so duplicate cancels can be detected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68775",
"url": "https://www.suse.com/security/cve/CVE-2025-68775"
},
{
"category": "external",
"summary": "SUSE Bug 1256665 for CVE-2025-68775",
"url": "https://bugzilla.suse.com/1256665"
},
{
"category": "external",
"summary": "SUSE Bug 1256666 for CVE-2025-68775",
"url": "https://bugzilla.suse.com/1256666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-68775"
},
{
"cve": "CVE-2025-68776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68776"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/hsr: fix NULL pointer dereference in prp_get_untagged_frame()\n\nprp_get_untagged_frame() calls __pskb_copy() to create frame-\u003eskb_std\nbut doesn\u0027t check if the allocation failed. If __pskb_copy() returns\nNULL, skb_clone() is called with a NULL pointer, causing a crash:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]\nCPU: 0 UID: 0 PID: 5625 Comm: syz.1.18 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:skb_clone+0xd7/0x3a0 net/core/skbuff.c:2041\nCode: 03 42 80 3c 20 00 74 08 4c 89 f7 e8 23 29 05 f9 49 83 3e 00 0f 85 a0 01 00 00 e8 94 dd 9d f8 48 8d 6b 7e 49 89 ee 49 c1 ee 03 \u003c43\u003e 0f b6 04 26 84 c0 0f 85 d1 01 00 00 44 0f b6 7d 00 41 83 e7 0c\nRSP: 0018:ffffc9000d00f200 EFLAGS: 00010207\nRAX: ffffffff892235a1 RBX: 0000000000000000 RCX: ffff88803372a480\nRDX: 0000000000000000 RSI: 0000000000000820 RDI: 0000000000000000\nRBP: 000000000000007e R08: ffffffff8f7d0f77 R09: 1ffffffff1efa1ee\nR10: dffffc0000000000 R11: fffffbfff1efa1ef R12: dffffc0000000000\nR13: 0000000000000820 R14: 000000000000000f R15: ffff88805144cc00\nFS: 0000555557f6d500(0000) GS:ffff88808d72f000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000555581d35808 CR3: 000000005040e000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n hsr_forward_do net/hsr/hsr_forward.c:-1 [inline]\n hsr_forward_skb+0x1013/0x2860 net/hsr/hsr_forward.c:741\n hsr_handle_frame+0x6ce/0xa70 net/hsr/hsr_slave.c:84\n __netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966\n __netif_receive_skb_one_core net/core/dev.c:6077 [inline]\n __netif_receive_skb+0x72/0x380 net/core/dev.c:6192\n netif_receive_skb_internal net/core/dev.c:6278 [inline]\n netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337\n tun_rx_batched+0x1b9/0x730 drivers/net/tun.c:1485\n tun_get_user+0x2b65/0x3e90 drivers/net/tun.c:1953\n tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x5c9/0xb30 fs/read_write.c:686\n ksys_write+0x145/0x250 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f0449f8e1ff\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48\nRSP: 002b:00007ffd7ad94c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007f044a1e5fa0 RCX: 00007f0449f8e1ff\nRDX: 000000000000003e RSI: 0000200000000500 RDI: 00000000000000c8\nRBP: 00007ffd7ad94d20 R08: 0000000000000000 R09: 0000000000000000\nR10: 000000000000003e R11: 0000000000000293 R12: 0000000000000001\nR13: 00007f044a1e5fa0 R14: 00007f044a1e5fa0 R15: 0000000000000003\n \u003c/TASK\u003e\n\nAdd a NULL check immediately after __pskb_copy() to handle allocation\nfailures gracefully.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68776",
"url": "https://www.suse.com/security/cve/CVE-2025-68776"
},
{
"category": "external",
"summary": "SUSE Bug 1256659 for CVE-2025-68776",
"url": "https://bugzilla.suse.com/1256659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68776"
},
{
"cve": "CVE-2025-68777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68777"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ti_am335x_tsc - fix off-by-one error in wire_order validation\n\nThe current validation \u0027wire_order[i] \u003e ARRAY_SIZE(config_pins)\u0027 allows\nwire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds\naccess when used as index in \u0027config_pins[wire_order[i]]\u0027.\n\nSince config_pins has 4 elements (indices 0-3), the valid range for\nwire_order should be 0-3. Fix the off-by-one error by using \u003e= instead\nof \u003e in the validation check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68777",
"url": "https://www.suse.com/security/cve/CVE-2025-68777"
},
{
"category": "external",
"summary": "SUSE Bug 1256655 for CVE-2025-68777",
"url": "https://bugzilla.suse.com/1256655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68777"
},
{
"cve": "CVE-2025-68783",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68783"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-mixer: us16x08: validate meter packet indices\n\nget_meter_levels_from_urb() parses the 64-byte meter packets sent by\nthe device and fills the per-channel arrays meter_level[],\ncomp_level[] and master_level[] in struct snd_us16x08_meter_store.\n\nCurrently the function derives the channel index directly from the\nmeter packet (MUB2(meter_urb, s) - 1) and uses it to index those\narrays without validating the range. If the packet contains a\nnegative or out-of-range channel number, the driver may write past\nthe end of these arrays.\n\nIntroduce a local channel variable and validate it before updating the\narrays. We reject negative indices, limit meter_level[] and\ncomp_level[] to SND_US16X08_MAX_CHANNELS, and guard master_level[]\nupdates with ARRAY_SIZE(master_level).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68783",
"url": "https://www.suse.com/security/cve/CVE-2025-68783"
},
{
"category": "external",
"summary": "SUSE Bug 1256650 for CVE-2025-68783",
"url": "https://bugzilla.suse.com/1256650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68783"
},
{
"cve": "CVE-2025-68788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: do not generate ACCESS/MODIFY events on child for special files\n\ninotify/fanotify do not allow users with no read access to a file to\nsubscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the\nsame user to subscribe for watching events on children when the user\nhas access to the parent directory (e.g. /dev).\n\nUsers with no read access to a file but with read access to its parent\ndirectory can still stat the file and see if it was accessed/modified\nvia atime/mtime change.\n\nThe same is not true for special files (e.g. /dev/null). Users will not\ngenerally observe atime/mtime changes when other users read/write to\nspecial files, only when someone sets atime/mtime via utimensat().\n\nAlign fsnotify events with this stat behavior and do not generate\nACCESS/MODIFY events to parent watchers on read/write of special files.\nThe events are still generated to parent watchers on utimensat(). This\ncloses some side-channels that could be possibly used for information\nexfiltration [1].\n\n[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68788",
"url": "https://www.suse.com/security/cve/CVE-2025-68788"
},
{
"category": "external",
"summary": "SUSE Bug 1256638 for CVE-2025-68788",
"url": "https://bugzilla.suse.com/1256638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68788"
},
{
"cve": "CVE-2025-68789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68789"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68789",
"url": "https://www.suse.com/security/cve/CVE-2025-68789"
},
{
"category": "external",
"summary": "SUSE Bug 1256781 for CVE-2025-68789",
"url": "https://bugzilla.suse.com/1256781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68789"
},
{
"cve": "CVE-2025-68795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68795"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: Avoid overflowing userspace buffer on stats query\n\nThe ethtool -S command operates across three ioctl calls:\nETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and\nETHTOOL_GSTATS for the values.\n\nIf the number of stats changes between these calls (e.g., due to device\nreconfiguration), userspace\u0027s buffer allocation will be incorrect,\npotentially leading to buffer overflow.\n\nDrivers are generally expected to maintain stable stat counts, but some\ndrivers (e.g., mlx5, bnx2x, bna, ksz884x) use dynamic counters, making\nthis scenario possible.\n\nSome drivers try to handle this internally:\n- bnad_get_ethtool_stats() returns early in case stats.n_stats is not\n equal to the driver\u0027s stats count.\n- micrel/ksz884x also makes sure not to write anything beyond\n stats.n_stats and overflow the buffer.\n\nHowever, both use stats.n_stats which is already assigned with the value\nreturned from get_sset_count(), hence won\u0027t solve the issue described\nhere.\n\nChange ethtool_get_strings(), ethtool_get_stats(),\nethtool_get_phy_stats() to not return anything in case of a mismatch\nbetween userspace\u0027s size and get_sset_size(), to prevent buffer\noverflow.\nThe returned n_stats value will be equal to zero, to reflect that\nnothing has been returned.\n\nThis could result in one of two cases when using upstream ethtool,\ndepending on when the size change is detected:\n1. When detected in ethtool_get_strings():\n # ethtool -S eth2\n no stats available\n\n2. When detected in get stats, all stats will be reported as zero.\n\nBoth cases are presumably transient, and a subsequent ethtool call\nshould succeed.\n\nOther than the overflow avoidance, these two cases are very evident (no\noutput/cleared stats), which is arguably better than presenting\nincorrect/shifted stats.\nI also considered returning an error instead of a \"silent\" response, but\nthat seems more destructive towards userspace apps.\n\nNotes:\n- This patch does not claim to fix the inherent race, it only makes sure\n that we do not overflow the userspace buffer, and makes for a more\n predictable behavior.\n\n- RTNL lock is held during each ioctl, the race window exists between\n the separate ioctl calls when the lock is released.\n\n- Userspace ethtool always fills stats.n_stats, but it is likely that\n these stats ioctls are implemented in other userspace applications\n which might not fill it. The added code checks that it\u0027s not zero,\n to prevent any regressions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68795",
"url": "https://www.suse.com/security/cve/CVE-2025-68795"
},
{
"category": "external",
"summary": "SUSE Bug 1256688 for CVE-2025-68795",
"url": "https://bugzilla.suse.com/1256688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68795"
},
{
"cve": "CVE-2025-68797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68797"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nchar: applicom: fix NULL pointer dereference in ac_ioctl\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nIn ac_ioctl, the validation of IndexCard and the check for a valid\nRamIO pointer are skipped when cmd is 6. However, the function\nunconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the\nend.\n\nIf cmd is 6, IndexCard may reference a board that does not exist\n(where RamIO is NULL), leading to a NULL pointer dereference.\n\nFix this by skipping the readb access when cmd is 6, as this\ncommand is a global information query and does not target a specific\nboard context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68797",
"url": "https://www.suse.com/security/cve/CVE-2025-68797"
},
{
"category": "external",
"summary": "SUSE Bug 1256660 for CVE-2025-68797",
"url": "https://bugzilla.suse.com/1256660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68797"
},
{
"cve": "CVE-2025-68798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68798"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/amd: Check event before enable to avoid GPF\n\nOn AMD machines cpuc-\u003eevents[idx] can become NULL in a subtle race\ncondition with NMI-\u003ethrottle-\u003ex86_pmu_stop().\n\nCheck event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.\nThis appears to be an AMD only issue.\n\nSyzkaller reported a GPF in amd_pmu_enable_all.\n\nINFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143\n msecs\nOops: general protection fault, probably for non-canonical address\n 0xdffffc0000000034: 0000 PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7]\nCPU: 0 UID: 0 PID: 328415 Comm: repro_36674776 Not tainted 6.12.0-rc1-syzk\nRIP: 0010:x86_pmu_enable_event (arch/x86/events/perf_event.h:1195\n arch/x86/events/core.c:1430)\nRSP: 0018:ffff888118009d60 EFLAGS: 00010012\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000034 RSI: 0000000000000000 RDI: 00000000000001a0\nRBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002\nR13: ffff88811802a440 R14: ffff88811802a240 R15: ffff8881132d8601\nFS: 00007f097dfaa700(0000) GS:ffff888118000000(0000) GS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200001c0 CR3: 0000000103d56000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\namd_pmu_enable_all (arch/x86/events/amd/core.c:760 (discriminator 2))\nx86_pmu_enable (arch/x86/events/core.c:1360)\nevent_sched_out (kernel/events/core.c:1191 kernel/events/core.c:1186\n kernel/events/core.c:2346)\n__perf_remove_from_context (kernel/events/core.c:2435)\nevent_function (kernel/events/core.c:259)\nremote_function (kernel/events/core.c:92 (discriminator 1)\n kernel/events/core.c:72 (discriminator 1))\n__flush_smp_call_function_queue (./arch/x86/include/asm/jump_label.h:27\n ./include/linux/jump_label.h:207 ./include/trace/events/csd.h:64\n kernel/smp.c:135 kernel/smp.c:540)\n__sysvec_call_function_single (./arch/x86/include/asm/jump_label.h:27\n ./include/linux/jump_label.h:207\n ./arch/x86/include/asm/trace/irq_vectors.h:99 arch/x86/kernel/smp.c:272)\nsysvec_call_function_single (arch/x86/kernel/smp.c:266 (discriminator 47)\n arch/x86/kernel/smp.c:266 (discriminator 47))\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68798",
"url": "https://www.suse.com/security/cve/CVE-2025-68798"
},
{
"category": "external",
"summary": "SUSE Bug 1256689 for CVE-2025-68798",
"url": "https://bugzilla.suse.com/1256689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68798"
},
{
"cve": "CVE-2025-68800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68800"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats\n\nCited commit added a dedicated mutex (instead of RTNL) to protect the\nmulticast route list, so that it will not change while the driver\nperiodically traverses it in order to update the kernel about multicast\nroute stats that were queried from the device.\n\nOne instance of list entry deletion (during route replace) was missed\nand it can result in a use-after-free [1].\n\nFix by acquiring the mutex before deleting the entry from the list and\nreleasing it afterwards.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\nRead of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043\n\nCPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)\nHardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017\nWorkqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xba/0x110\n print_report+0x174/0x4f5\n kasan_report+0xdf/0x110\n mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_save_free_info+0x3b/0x70\n __kasan_slab_free+0x43/0x70\n kfree+0x14e/0x700\n mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68800",
"url": "https://www.suse.com/security/cve/CVE-2025-68800"
},
{
"category": "external",
"summary": "SUSE Bug 1256646 for CVE-2025-68800",
"url": "https://bugzilla.suse.com/1256646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68800"
},
{
"cve": "CVE-2025-68801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68801"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_router: Fix neighbour use-after-free\n\nWe sometimes observe use-after-free when dereferencing a neighbour [1].\nThe problem seems to be that the driver stores a pointer to the\nneighbour, but without holding a reference on it. A reference is only\ntaken when the neighbour is used by a nexthop.\n\nFix by simplifying the reference counting scheme. Always take a\nreference when storing a neighbour pointer in a neighbour entry. Avoid\ntaking a referencing when the neighbour is used by a nexthop as the\nneighbour entry associated with the nexthop already holds a reference.\n\nTested by running the test that uncovered the problem over 300 times.\nWithout this patch the problem was reproduced after a handful of\niterations.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x2d4/0x310\nRead of size 8 at addr ffff88817f8e3420 by task ip/3929\n\nCPU: 3 UID: 0 PID: 3929 Comm: ip Not tainted 6.18.0-rc4-virtme-g36b21a067510 #3 PREEMPT(full)\nHardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_address_description.constprop.0+0x6e/0x300\n print_report+0xfc/0x1fb\n kasan_report+0xe4/0x110\n mlxsw_sp_neigh_entry_update+0x2d4/0x310\n mlxsw_sp_router_rif_gone_sync+0x35f/0x510\n mlxsw_sp_rif_destroy+0x1ea/0x730\n mlxsw_sp_inetaddr_port_vlan_event+0xa1/0x1b0\n __mlxsw_sp_inetaddr_lag_event+0xcc/0x130\n __mlxsw_sp_inetaddr_event+0xf5/0x3c0\n mlxsw_sp_router_netdevice_event+0x1015/0x1580\n notifier_call_chain+0xcc/0x150\n call_netdevice_notifiers_info+0x7e/0x100\n __netdev_upper_dev_unlink+0x10b/0x210\n netdev_upper_dev_unlink+0x79/0xa0\n vrf_del_slave+0x18/0x50\n do_set_master+0x146/0x7d0\n do_setlink.isra.0+0x9a0/0x2880\n rtnl_newlink+0x637/0xb20\n rtnetlink_rcv_msg+0x6fe/0xb90\n netlink_rcv_skb+0x123/0x380\n netlink_unicast+0x4a3/0x770\n netlink_sendmsg+0x75b/0xc90\n __sock_sendmsg+0xbe/0x160\n ____sys_sendmsg+0x5b2/0x7d0\n ___sys_sendmsg+0xfd/0x180\n __sys_sendmsg+0x124/0x1c0\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[...]\n\nAllocated by task 109:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7b/0x90\n __kmalloc_noprof+0x2c1/0x790\n neigh_alloc+0x6af/0x8f0\n ___neigh_create+0x63/0xe90\n mlxsw_sp_nexthop_neigh_init+0x430/0x7e0\n mlxsw_sp_nexthop_type_init+0x212/0x960\n mlxsw_sp_nexthop6_group_info_init.constprop.0+0x81f/0x1280\n mlxsw_sp_nexthop6_group_get+0x392/0x6a0\n mlxsw_sp_fib6_entry_create+0x46a/0xfd0\n mlxsw_sp_router_fib6_replace+0x1ed/0x5f0\n mlxsw_sp_router_fib6_event_work+0x10a/0x2a0\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20\n\nFreed by task 154:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_save_free_info+0x3b/0x60\n __kasan_slab_free+0x43/0x70\n kmem_cache_free_bulk.part.0+0x1eb/0x5e0\n kvfree_rcu_bulk+0x1f2/0x260\n kfree_rcu_work+0x130/0x1b0\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20\n\nLast potentially related work creation:\n kasan_save_stack+0x30/0x50\n kasan_record_aux_stack+0x8c/0xa0\n kvfree_call_rcu+0x93/0x5b0\n mlxsw_sp_router_neigh_event_work+0x67d/0x860\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68801",
"url": "https://www.suse.com/security/cve/CVE-2025-68801"
},
{
"category": "external",
"summary": "SUSE Bug 1256653 for CVE-2025-68801",
"url": "https://bugzilla.suse.com/1256653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68801"
},
{
"cve": "CVE-2025-68802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68802"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Limit num_syncs to prevent oversized allocations\n\nThe exec and vm_bind ioctl allow userspace to specify an arbitrary\nnum_syncs value. Without bounds checking, a very large num_syncs\ncan force an excessively large allocation, leading to kernel warnings\nfrom the page allocator as below.\n\nIntroduce DRM_XE_MAX_SYNCS (set to 1024) and reject any request\nexceeding this limit.\n\n\"\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 1217 at mm/page_alloc.c:5124 __alloc_frozen_pages_noprof+0x2f8/0x2180 mm/page_alloc.c:5124\n...\nCall Trace:\n \u003cTASK\u003e\n alloc_pages_mpol+0xe4/0x330 mm/mempolicy.c:2416\n ___kmalloc_large_node+0xd8/0x110 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0xe0 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kmalloc_noprof+0x3d4/0x4b0 mm/slub.c:4388\n kmalloc_noprof include/linux/slab.h:909 [inline]\n kmalloc_array_noprof include/linux/slab.h:948 [inline]\n xe_exec_ioctl+0xa47/0x1e70 drivers/gpu/drm/xe/xe_exec.c:158\n drm_ioctl_kernel+0x1f1/0x3e0 drivers/gpu/drm/drm_ioctl.c:797\n drm_ioctl+0x5e7/0xc50 drivers/gpu/drm/drm_ioctl.c:894\n xe_drm_ioctl+0x10b/0x170 drivers/gpu/drm/xe/xe_device.c:224\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xbb/0x380 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\"\n\nv2: Add \"Reported-by\" and Cc stable kernels.\nv3: Change XE_MAX_SYNCS from 64 to 1024. (Matt \u0026 Ashutosh)\nv4: s/XE_MAX_SYNCS/DRM_XE_MAX_SYNCS/ (Matt)\nv5: Do the check at the top of the exec func. (Matt)\n\n(cherry picked from commit b07bac9bd708ec468cd1b8a5fe70ae2ac9b0a11c)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68802",
"url": "https://www.suse.com/security/cve/CVE-2025-68802"
},
{
"category": "external",
"summary": "SUSE Bug 1256661 for CVE-2025-68802",
"url": "https://bugzilla.suse.com/1256661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2025-68802"
},
{
"cve": "CVE-2025-68803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: NFSv4 file creation neglects setting ACL\n\nAn NFSv4 client that sets an ACL with a named principal during file\ncreation retrieves the ACL afterwards, and finds that it is only a\ndefault ACL (based on the mode bits) and not the ACL that was\nrequested during file creation. This violates RFC 8881 section\n6.4.1.3: \"the ACL attribute is set as given\".\n\nThe issue occurs in nfsd_create_setattr(), which calls\nnfsd_attrs_valid() to determine whether to call nfsd_setattr().\nHowever, nfsd_attrs_valid() checks only for iattr changes and\nsecurity labels, but not POSIX ACLs. When only an ACL is present,\nthe function returns false, nfsd_setattr() is skipped, and the\nPOSIX ACL is never applied to the inode.\n\nSubsequently, when the client retrieves the ACL, the server finds\nno POSIX ACL on the inode and returns one generated from the file\u0027s\nmode bits rather than returning the originally-specified ACL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68803",
"url": "https://www.suse.com/security/cve/CVE-2025-68803"
},
{
"category": "external",
"summary": "SUSE Bug 1256770 for CVE-2025-68803",
"url": "https://bugzilla.suse.com/1256770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68803"
},
{
"cve": "CVE-2025-68804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68804"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver\n\nAfter unbinding the driver, another kthread `cros_ec_console_log_work`\nis still accessing the device, resulting an UAF and crash.\n\nThe driver doesn\u0027t unregister the EC device in .remove() which should\nshutdown sub-devices synchronously. Fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68804",
"url": "https://www.suse.com/security/cve/CVE-2025-68804"
},
{
"category": "external",
"summary": "SUSE Bug 1256617 for CVE-2025-68804",
"url": "https://bugzilla.suse.com/1256617"
},
{
"category": "external",
"summary": "SUSE Bug 1256618 for CVE-2025-68804",
"url": "https://bugzilla.suse.com/1256618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-68804"
},
{
"cve": "CVE-2025-68808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68808"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: initialize local pointers upon transfer of memory ownership\n\nvidtv_channel_si_init() creates a temporary list (program, service, event)\nand ownership of the memory itself is transferred to the PAT/SDT/EIT\ntables through vidtv_psi_pat_program_assign(),\nvidtv_psi_sdt_service_assign(), vidtv_psi_eit_event_assign().\n\nThe problem here is that the local pointer where the memory ownership\ntransfer was completed is not initialized to NULL. This causes the\nvidtv_psi_pmt_create_sec_for_each_pat_entry() function to fail, and\nin the flow that jumps to free_eit, the memory that was freed by\nvidtv_psi_*_table_destroy() can be accessed again by\nvidtv_psi_*_event_destroy() due to the uninitialized local pointer, so it\nis freed once again.\n\nTherefore, to prevent use-after-free and double-free vulnerability,\nlocal pointers must be initialized to NULL when transferring memory\nownership.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68808",
"url": "https://www.suse.com/security/cve/CVE-2025-68808"
},
{
"category": "external",
"summary": "SUSE Bug 1256682 for CVE-2025-68808",
"url": "https://bugzilla.suse.com/1256682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68808"
},
{
"cve": "CVE-2025-68813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix ipv4 null-ptr-deref in route error path\n\nThe IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()\nwithout ensuring skb-\u003edev is set, leading to a NULL pointer dereference\nin fib_compute_spec_dst() when ipv4_link_failure() attempts to send\nICMP destination unreachable messages.\n\nThe issue emerged after commit ed0de45a1008 (\"ipv4: recompile ip options\nin ipv4_link_failure\") started calling __ip_options_compile() from\nipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()\nwhich dereferences skb-\u003edev. An attempt was made to fix the NULL skb-\u003edev\ndereference in commit 0113d9c9d1cc (\"ipv4: fix null-deref in\nipv4_link_failure\"), but it only addressed the immediate dev_net(skb-\u003edev)\ndereference by using a fallback device. The fix was incomplete because\nfib_compute_spec_dst() later in the call chain still accesses skb-\u003edev\ndirectly, which remains NULL when IPVS calls dst_link_failure().\n\nThe crash occurs when:\n1. IPVS processes a packet in NAT mode with a misconfigured destination\n2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route\n3. The error path calls dst_link_failure(skb) with skb-\u003edev == NULL\n4. ipv4_link_failure() -\u003e ipv4_send_dest_unreach() -\u003e\n __ip_options_compile() -\u003e fib_compute_spec_dst()\n5. fib_compute_spec_dst() dereferences NULL skb-\u003edev\n\nApply the same fix used for IPv6 in commit 326bf17ea5d4 (\"ipvs: fix\nipv6 route unreach panic\"): set skb-\u003edev from skb_dst(skb)-\u003edev before\ncalling dst_link_failure().\n\nKASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]\nCPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2\nRIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233\nRIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285\nCall Trace:\n \u003cTASK\u003e\n spec_dst_fill net/ipv4/ip_options.c:232\n spec_dst_fill net/ipv4/ip_options.c:229\n __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330\n ipv4_send_dest_unreach net/ipv4/route.c:1252\n ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265\n dst_link_failure include/net/dst.h:437\n __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412\n ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68813",
"url": "https://www.suse.com/security/cve/CVE-2025-68813"
},
{
"category": "external",
"summary": "SUSE Bug 1256641 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "external",
"summary": "SUSE Bug 1256644 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-68813"
},
{
"cve": "CVE-2025-68814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68814"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix filename leak in __io_openat_prep()\n\n __io_openat_prep() allocates a struct filename using getname(). However,\nfor the condition of the file being installed in the fixed file table as\nwell as having O_CLOEXEC flag set, the function returns early. At that\npoint, the request doesn\u0027t have REQ_F_NEED_CLEANUP flag set. Due to this,\nthe memory for the newly allocated struct filename is not cleaned up,\ncausing a memory leak.\n\nFix this by setting the REQ_F_NEED_CLEANUP for the request just after the\nsuccessful getname() call, so that when the request is torn down, the\nfilename will be cleaned up, along with other resources needing cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68814",
"url": "https://www.suse.com/security/cve/CVE-2025-68814"
},
{
"category": "external",
"summary": "SUSE Bug 1256651 for CVE-2025-68814",
"url": "https://bugzilla.suse.com/1256651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68814"
},
{
"cve": "CVE-2025-68815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68815"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Remove drr class from the active list if it changes to strict\n\nWhenever a user issues an ets qdisc change command, transforming a\ndrr class into a strict one, the ets code isn\u0027t checking whether that\nclass was in the active list and removing it. This means that, if a\nuser changes a strict class (which was in the active list) back to a drr\none, that class will be added twice to the active list [1].\n\nDoing so with the following commands:\n\ntc qdisc add dev lo root handle 1: ets bands 2 strict 1\ntc qdisc add dev lo parent 1:2 handle 20: \\\n tbf rate 8bit burst 100b latency 1s\ntc filter add dev lo parent 1: basic classid 1:2\nping -c1 -W0.01 -s 56 127.0.0.1\ntc qdisc change dev lo root handle 1: ets bands 2 strict 2\ntc qdisc change dev lo root handle 1: ets bands 2 strict 1\nping -c1 -W0.01 -s 56 127.0.0.1\n\nWill trigger the following splat with list debug turned on:\n\n[ 59.279014][ T365] ------------[ cut here ]------------\n[ 59.279452][ T365] list_add double add: new=ffff88801d60e350, prev=ffff88801d60e350, next=ffff88801d60e2c0.\n[ 59.280153][ T365] WARNING: CPU: 3 PID: 365 at lib/list_debug.c:35 __list_add_valid_or_report+0x17f/0x220\n[ 59.280860][ T365] Modules linked in:\n[ 59.281165][ T365] CPU: 3 UID: 0 PID: 365 Comm: tc Not tainted 6.18.0-rc7-00105-g7e9f13163c13-dirty #239 PREEMPT(voluntary)\n[ 59.281977][ T365] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n[ 59.282391][ T365] RIP: 0010:__list_add_valid_or_report+0x17f/0x220\n[ 59.282842][ T365] Code: 89 c6 e8 d4 b7 0d ff 90 0f 0b 90 90 31 c0 e9 31 ff ff ff 90 48 c7 c7 e0 a0 22 9f 48 89 f2 48 89 c1 4c 89 c6 e8 b2 b7 0d ff 90 \u003c0f\u003e 0b 90 90 31 c0 e9 0f ff ff ff 48 89 f7 48 89 44 24 10 4c 89 44\n...\n[ 59.288812][ T365] Call Trace:\n[ 59.289056][ T365] \u003cTASK\u003e\n[ 59.289224][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.289546][ T365] ets_qdisc_change+0xd2b/0x1e80\n[ 59.289891][ T365] ? __lock_acquire+0x7e7/0x1be0\n[ 59.290223][ T365] ? __pfx_ets_qdisc_change+0x10/0x10\n[ 59.290546][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.290898][ T365] ? __mutex_trylock_common+0xda/0x240\n[ 59.291228][ T365] ? __pfx___mutex_trylock_common+0x10/0x10\n[ 59.291655][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.291993][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.292313][ T365] ? trace_contention_end+0xc8/0x110\n[ 59.292656][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.293022][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.293351][ T365] tc_modify_qdisc+0x63a/0x1cf0\n\nFix this by always checking and removing an ets class from the active list\nwhen changing it to strict.\n\n[1] https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/tree/net/sched/sch_ets.c?id=ce052b9402e461a9aded599f5b47e76bc727f7de#n663",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68815",
"url": "https://www.suse.com/security/cve/CVE-2025-68815"
},
{
"category": "external",
"summary": "SUSE Bug 1256680 for CVE-2025-68815",
"url": "https://bugzilla.suse.com/1256680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68815"
},
{
"cve": "CVE-2025-68816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68816"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fw_tracer, Validate format string parameters\n\nAdd validation for format string parameters in the firmware tracer to\nprevent potential security vulnerabilities and crashes from malformed\nformat strings received from firmware.\n\nThe firmware tracer receives format strings from the device firmware and\nuses them to format trace messages. Without proper validation, bad\nfirmware could provide format strings with invalid format specifiers\n(e.g., %s, %p, %n) that could lead to crashes, or other undefined\nbehavior.\n\nAdd mlx5_tracer_validate_params() to validate that all format specifiers\nin trace strings are limited to safe integer/hex formats (%x, %d, %i,\n%u, %llx, %lx, etc.). Reject strings containing other format types that\ncould be used to access arbitrary memory or cause crashes.\nInvalid format strings are added to the trace output for visibility with\n\"BAD_FORMAT: \" prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68816",
"url": "https://www.suse.com/security/cve/CVE-2025-68816"
},
{
"category": "external",
"summary": "SUSE Bug 1256674 for CVE-2025-68816",
"url": "https://bugzilla.suse.com/1256674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68816"
},
{
"cve": "CVE-2025-68819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()\n\nrlen value is a user-controlled value, but dtv5100_i2c_msg() does not\ncheck the size of the rlen value. Therefore, if it is set to a value\nlarger than sizeof(st-\u003edata), an out-of-bounds vuln occurs for st-\u003edata.\n\nTherefore, we need to add proper range checking to prevent this vuln.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68819",
"url": "https://www.suse.com/security/cve/CVE-2025-68819"
},
{
"category": "external",
"summary": "SUSE Bug 1256664 for CVE-2025-68819",
"url": "https://bugzilla.suse.com/1256664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68819"
},
{
"cve": "CVE-2025-68820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68820"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: xattr: fix null pointer deref in ext4_raw_inode()\n\nIf ext4_get_inode_loc() fails (e.g. if it returns -EFSCORRUPTED),\niloc.bh will remain set to NULL. Since ext4_xattr_inode_dec_ref_all()\nlacks error checking, this will lead to a null pointer dereference\nin ext4_raw_inode(), called right after ext4_get_inode_loc().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68820",
"url": "https://www.suse.com/security/cve/CVE-2025-68820"
},
{
"category": "external",
"summary": "SUSE Bug 1256754 for CVE-2025-68820",
"url": "https://bugzilla.suse.com/1256754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-68820"
},
{
"cve": "CVE-2025-71064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: using the num_tqps in the vf driver to apply for resources\n\nCurrently, hdev-\u003ehtqp is allocated using hdev-\u003enum_tqps, and kinfo-\u003etqp\nis allocated using kinfo-\u003enum_tqps. However, kinfo-\u003enum_tqps is set to\nmin(new_tqps, hdev-\u003enum_tqps); Therefore, kinfo-\u003enum_tqps may be smaller\nthan hdev-\u003enum_tqps, which causes some hdev-\u003ehtqp[i] to remain\nuninitialized in hclgevf_knic_setup().\n\nThus, this patch allocates hdev-\u003ehtqp and kinfo-\u003etqp using hdev-\u003enum_tqps,\nensuring that the lengths of hdev-\u003ehtqp and kinfo-\u003etqp are consistent\nand that all elements are properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71064",
"url": "https://www.suse.com/security/cve/CVE-2025-71064"
},
{
"category": "external",
"summary": "SUSE Bug 1256654 for CVE-2025-71064",
"url": "https://bugzilla.suse.com/1256654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71064"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/oa: Limit num_syncs to prevent oversized allocations\n\nThe OA open parameters did not validate num_syncs, allowing\nuserspace to pass arbitrarily large values, potentially\nleading to excessive allocations.\n\nAdd check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS,\nreturning -EINVAL when the limit is violated.\n\nv2: use XE_IOCTL_DBG() and drop duplicated check. (Ashutosh)\n\n(cherry picked from commit e057b2d2b8d815df3858a87dffafa2af37e5945b)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71076",
"url": "https://www.suse.com/security/cve/CVE-2025-71076"
},
{
"category": "external",
"summary": "SUSE Bug 1256627 for CVE-2025-71076",
"url": "https://bugzilla.suse.com/1256627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71076"
},
{
"cve": "CVE-2025-71077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71077"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Cap the number of PCR banks\n\ntpm2_get_pcr_allocation() does not cap any upper limit for the number of\nbanks. Cap the limit to eight banks so that out of bounds values coming\nfrom external I/O cause on only limited harm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71077",
"url": "https://www.suse.com/security/cve/CVE-2025-71077"
},
{
"category": "external",
"summary": "SUSE Bug 1256613 for CVE-2025-71077",
"url": "https://bugzilla.suse.com/1256613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71077"
},
{
"cve": "CVE-2025-71078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s/slb: Fix SLB multihit issue during SLB preload\n\nOn systems using the hash MMU, there is a software SLB preload cache that\nmirrors the entries loaded into the hardware SLB buffer. This preload\ncache is subject to periodic eviction - typically after every 256 context\nswitches - to remove old entry.\n\nTo optimize performance, the kernel skips switch_mmu_context() in\nswitch_mm_irqs_off() when the prev and next mm_struct are the same.\nHowever, on hash MMU systems, this can lead to inconsistencies between\nthe hardware SLB and the software preload cache.\n\nIf an SLB entry for a process is evicted from the software cache on one\nCPU, and the same process later runs on another CPU without executing\nswitch_mmu_context(), the hardware SLB may retain stale entries. If the\nkernel then attempts to reload that entry, it can trigger an SLB\nmulti-hit error.\n\nThe following timeline shows how stale SLB entries are created and can\ncause a multi-hit error when a process moves between CPUs without a\nMMU context switch.\n\nCPU 0 CPU 1\n----- -----\nProcess P\nexec swapper/1\n load_elf_binary\n begin_new_exc\n activate_mm\n switch_mm_irqs_off\n switch_mmu_context\n switch_slb\n /*\n * This invalidates all\n * the entries in the HW\n * and setup the new HW\n * SLB entries as per the\n * preload cache.\n */\ncontext_switch\nsched_migrate_task migrates process P to cpu-1\n\nProcess swapper/0 context switch (to process P)\n(uses mm_struct of Process P) switch_mm_irqs_off()\n switch_slb\n load_slb++\n /*\n * load_slb becomes 0 here\n * and we evict an entry from\n * the preload cache with\n * preload_age(). We still\n * keep HW SLB and preload\n * cache in sync, that is\n * because all HW SLB entries\n * anyways gets evicted in\n * switch_slb during SLBIA.\n * We then only add those\n * entries back in HW SLB,\n * which are currently\n * present in preload_cache\n * (after eviction).\n */\n load_elf_binary continues...\n setup_new_exec()\n slb_setup_new_exec()\n\n sched_switch event\n sched_migrate_task migrates\n process P to cpu-0\n\ncontext_switch from swapper/0 to Process P\n switch_mm_irqs_off()\n /*\n * Since both prev and next mm struct are same we don\u0027t call\n * switch_mmu_context(). This will cause the HW SLB and SW preload\n * cache to go out of sync in preload_new_slb_context. Because there\n * was an SLB entry which was evicted from both HW and preload cache\n * on cpu-1. Now later in preload_new_slb_context(), when we will try\n * to add the same preload entry again, we will add this to the SW\n * preload cache and then will add it to the HW SLB. Since on cpu-0\n * this entry was never invalidated, hence adding this entry to the HW\n * SLB will cause a SLB multi-hit error.\n */\nload_elf_binary cont\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71078",
"url": "https://www.suse.com/security/cve/CVE-2025-71078"
},
{
"category": "external",
"summary": "SUSE Bug 1256616 for CVE-2025-71078",
"url": "https://bugzilla.suse.com/1256616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71078"
},
{
"cve": "CVE-2025-71079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71079"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write\n\nA deadlock can occur between nfc_unregister_device() and rfkill_fop_write()\ndue to lock ordering inversion between device_lock and rfkill_global_mutex.\n\nThe problematic lock order is:\n\nThread A (rfkill_fop_write):\n rfkill_fop_write()\n mutex_lock(\u0026rfkill_global_mutex)\n rfkill_set_block()\n nfc_rfkill_set_block()\n nfc_dev_down()\n device_lock(\u0026dev-\u003edev) \u003c- waits for device_lock\n\nThread B (nfc_unregister_device):\n nfc_unregister_device()\n device_lock(\u0026dev-\u003edev)\n rfkill_unregister()\n mutex_lock(\u0026rfkill_global_mutex) \u003c- waits for rfkill_global_mutex\n\nThis creates a classic ABBA deadlock scenario.\n\nFix this by moving rfkill_unregister() and rfkill_destroy() outside the\ndevice_lock critical section. Store the rfkill pointer in a local variable\nbefore releasing the lock, then call rfkill_unregister() after releasing\ndevice_lock.\n\nThis change is safe because rfkill_fop_write() holds rfkill_global_mutex\nwhile calling the rfkill callbacks, and rfkill_unregister() also acquires\nrfkill_global_mutex before cleanup. Therefore, rfkill_unregister() will\nwait for any ongoing callback to complete before proceeding, and\ndevice_del() is only called after rfkill_unregister() returns, preventing\nany use-after-free.\n\nThe similar lock ordering in nfc_register_device() (device_lock -\u003e\nrfkill_global_mutex via rfkill_register) is safe because during\nregistration the device is not yet in rfkill_list, so no concurrent\nrfkill operations can occur on this device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71079",
"url": "https://www.suse.com/security/cve/CVE-2025-71079"
},
{
"category": "external",
"summary": "SUSE Bug 1256619 for CVE-2025-71079",
"url": "https://bugzilla.suse.com/1256619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71079"
},
{
"cve": "CVE-2025-71080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT\n\nOn PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the\ncurrent task can be preempted. Another task running on the same CPU\nmay then execute rt6_make_pcpu_route() and successfully install a\npcpu_rt entry. When the first task resumes execution, its cmpxchg()\nin rt6_make_pcpu_route() will fail because rt6i_pcpu is no longer\nNULL, triggering the BUG_ON(prev). It\u0027s easy to reproduce it by adding\nmdelay() after rt6_get_pcpu_route().\n\nUsing preempt_disable/enable is not appropriate here because\nip6_rt_pcpu_alloc() may sleep.\n\nFix this by handling the cmpxchg() failure gracefully on PREEMPT_RT:\nfree our allocation and return the existing pcpu_rt installed by\nanother task. The BUG_ON is replaced by WARN_ON_ONCE for non-PREEMPT_RT\nkernels where such races should not occur.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71080",
"url": "https://www.suse.com/security/cve/CVE-2025-71080"
},
{
"category": "external",
"summary": "SUSE Bug 1256608 for CVE-2025-71080",
"url": "https://bugzilla.suse.com/1256608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2025-71080"
},
{
"cve": "CVE-2025-71081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: stm32: sai: fix OF node leak on probe\n\nThe reference taken to the sync provider OF node when probing the\nplatform device is currently only dropped if the set_sync() callback\nfails during DAI probe.\n\nMake sure to drop the reference on platform probe failures (e.g. probe\ndeferral) and on driver unbind.\n\nThis also avoids a potential use-after-free in case the DAI is ever\nreprobed without first rebinding the platform driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71081",
"url": "https://www.suse.com/security/cve/CVE-2025-71081"
},
{
"category": "external",
"summary": "SUSE Bug 1256609 for CVE-2025-71081",
"url": "https://bugzilla.suse.com/1256609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71081"
},
{
"cve": "CVE-2025-71082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: revert use of devm_kzalloc in btusb\n\nThis reverts commit 98921dbd00c4e (\"Bluetooth: Use devm_kzalloc in\nbtusb.c file\").\n\nIn btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This\nties the lifetime of all the btusb data to the binding of a driver to\none interface, INTF. In a driver that binds to other interfaces, ISOC\nand DIAG, this is an accident waiting to happen.\n\nThe issue is revealed in btusb_disconnect(), where calling\nusb_driver_release_interface(\u0026btusb_driver, data-\u003eintf) will have devm\nfree the data that is also being used by the other interfaces of the\ndriver that may not be released yet.\n\nTo fix this, revert the use of devm and go back to freeing memory\nexplicitly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71082",
"url": "https://www.suse.com/security/cve/CVE-2025-71082"
},
{
"category": "external",
"summary": "SUSE Bug 1256611 for CVE-2025-71082",
"url": "https://bugzilla.suse.com/1256611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71082"
},
{
"cve": "CVE-2025-71083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Avoid NULL pointer deref for evicted BOs\n\nIt is possible for a BO to exist that is not currently associated with a\nresource, e.g. because it has been evicted.\n\nWhen devcoredump tries to read the contents of all BOs for dumping, we need\nto expect this as well -- in this case, ENODATA is recorded instead of the\nbuffer contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71083",
"url": "https://www.suse.com/security/cve/CVE-2025-71083"
},
{
"category": "external",
"summary": "SUSE Bug 1256610 for CVE-2025-71083",
"url": "https://bugzilla.suse.com/1256610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71083"
},
{
"cve": "CVE-2025-71084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cm: Fix leaking the multicast GID table reference\n\nIf the CM ID is destroyed while the CM event for multicast creating is\nstill queued the cancel_work_sync() will prevent the work from running\nwhich also prevents destroying the ah_attr. This leaks a refcount and\ntriggers a WARN:\n\n GID entry ref leak for dev syz1 index 2 ref=573\n WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]\n WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886\n\nDestroy the ah_attr after canceling the work, it is safe to call this\ntwice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71084",
"url": "https://www.suse.com/security/cve/CVE-2025-71084"
},
{
"category": "external",
"summary": "SUSE Bug 1256622 for CVE-2025-71084",
"url": "https://bugzilla.suse.com/1256622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2025-71084"
},
{
"cve": "CVE-2025-71085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()\n\nThere exists a kernel oops caused by a BUG_ON(nhead \u003c 0) at\nnet/core/skbuff.c:2232 in pskb_expand_head().\nThis bug is triggered as part of the calipso_skbuff_setattr()\nroutine when skb_cow() is passed headroom \u003e INT_MAX\n(i.e. (int)(skb_headroom(skb) + len_delta) \u003c 0).\n\nThe root cause of the bug is due to an implicit integer cast in\n__skb_cow(). The check (headroom \u003e skb_headroom(skb)) is meant to ensure\nthat delta = headroom - skb_headroom(skb) is never negative, otherwise\nwe will trigger a BUG_ON in pskb_expand_head(). However, if\nheadroom \u003e INT_MAX and delta \u003c= -NET_SKB_PAD, the check passes, delta\nbecomes negative, and pskb_expand_head() is passed a negative value for\nnhead.\n\nFix the trigger condition in calipso_skbuff_setattr(). Avoid passing\n\"negative\" headroom sizes to skb_cow() within calipso_skbuff_setattr()\nby only using skb_cow() to grow headroom.\n\nPoC:\n\tUsing `netlabelctl` tool:\n\n netlabelctl map del default\n netlabelctl calipso add pass doi:7\n netlabelctl map add default address:0::1/128 protocol:calipso,7\n\n Then run the following PoC:\n\n int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\n // setup msghdr\n int cmsg_size = 2;\n int cmsg_len = 0x60;\n struct msghdr msg;\n struct sockaddr_in6 dest_addr;\n struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,\n sizeof(struct cmsghdr) + cmsg_len);\n msg.msg_name = \u0026dest_addr;\n msg.msg_namelen = sizeof(dest_addr);\n msg.msg_iov = NULL;\n msg.msg_iovlen = 0;\n msg.msg_control = cmsg;\n msg.msg_controllen = cmsg_len;\n msg.msg_flags = 0;\n\n // setup sockaddr\n dest_addr.sin6_family = AF_INET6;\n dest_addr.sin6_port = htons(31337);\n dest_addr.sin6_flowinfo = htonl(31337);\n dest_addr.sin6_addr = in6addr_loopback;\n dest_addr.sin6_scope_id = 31337;\n\n // setup cmsghdr\n cmsg-\u003ecmsg_len = cmsg_len;\n cmsg-\u003ecmsg_level = IPPROTO_IPV6;\n cmsg-\u003ecmsg_type = IPV6_HOPOPTS;\n char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);\n hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80\n\n sendmsg(fd, \u0026msg, 0);",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71085",
"url": "https://www.suse.com/security/cve/CVE-2025-71085"
},
{
"category": "external",
"summary": "SUSE Bug 1256623 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "external",
"summary": "SUSE Bug 1256624 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71085"
},
{
"cve": "CVE-2025-71086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rose: fix invalid array index in rose_kill_by_device()\n\nrose_kill_by_device() collects sockets into a local array[] and then\niterates over them to disconnect sockets bound to a device being brought\ndown.\n\nThe loop mistakenly indexes array[cnt] instead of array[i]. For cnt \u003c\nARRAY_SIZE(array), this reads an uninitialized entry; for cnt ==\nARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to\nan invalid socket pointer dereference and also leaks references taken\nvia sock_hold().\n\nFix the index to use i.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71086",
"url": "https://www.suse.com/security/cve/CVE-2025-71086"
},
{
"category": "external",
"summary": "SUSE Bug 1256625 for CVE-2025-71086",
"url": "https://bugzilla.suse.com/1256625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71086"
},
{
"cve": "CVE-2025-71087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: fix off-by-one issues in iavf_config_rss_reg()\n\nThere are off-by-one bugs when configuring RSS hash key and lookup\ntable, causing out-of-bounds reads to memory [1] and out-of-bounds\nwrites to device registers.\n\nBefore commit 43a3d9ba34c9 (\"i40evf: Allow PF driver to configure RSS\"),\nthe loop upper bounds were:\n i \u003c= I40E_VFQF_{HKEY,HLUT}_MAX_INDEX\nwhich is safe since the value is the last valid index.\n\nThat commit changed the bounds to:\n i \u003c= adapter-\u003erss_{key,lut}_size / 4\nwhere `rss_{key,lut}_size / 4` is the number of dwords, so the last\nvalid index is `(rss_{key,lut}_size / 4) - 1`. Therefore, using `\u003c=`\naccesses one element past the end.\n\nFix the issues by using `\u003c` instead of `\u003c=`, ensuring we do not exceed\nthe bounds.\n\n[1] KASAN splat about rss_key_size off-by-one\n BUG: KASAN: slab-out-of-bounds in iavf_config_rss+0x619/0x800\n Read of size 4 at addr ffff888102c50134 by task kworker/u8:6/63\n\n CPU: 0 UID: 0 PID: 63 Comm: kworker/u8:6 Not tainted 6.18.0-rc2-enjuk-tnguy-00378-g3005f5b77652-dirty #156 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n Workqueue: iavf iavf_watchdog_task\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xb0\n print_report+0x170/0x4f3\n kasan_report+0xe1/0x1a0\n iavf_config_rss+0x619/0x800\n iavf_watchdog_task+0x2be7/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\n Allocated by task 63:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x246/0x6f0\n iavf_watchdog_task+0x28fc/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n\n The buggy address belongs to the object at ffff888102c50100\n which belongs to the cache kmalloc-64 of size 64\n The buggy address is located 0 bytes to the right of\n allocated 52-byte region [ffff888102c50100, ffff888102c50134)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c50\n flags: 0x200000000000000(node=0|zone=2)\n page_type: f5(slab)\n raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888102c50000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n ffff888102c50080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n \u003effff888102c50100: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ^\n ffff888102c50180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc\n ffff888102c50200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71087",
"url": "https://www.suse.com/security/cve/CVE-2025-71087"
},
{
"category": "external",
"summary": "SUSE Bug 1256628 for CVE-2025-71087",
"url": "https://bugzilla.suse.com/1256628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71087"
},
{
"cve": "CVE-2025-71088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fallback earlier on simult connection\n\nSyzkaller reports a simult-connect race leading to inconsistent fallback\nstatus:\n\n WARNING: CPU: 3 PID: 33 at net/mptcp/subflow.c:1515 subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515\n Modules linked in:\n CPU: 3 UID: 0 PID: 33 Comm: ksoftirqd/3 Not tainted syzkaller #0 PREEMPT(full)\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n RIP: 0010:subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515\n Code: 89 ee e8 78 61 3c f6 40 84 ed 75 21 e8 8e 66 3c f6 44 89 fe bf 07 00 00 00 e8 c1 61 3c f6 41 83 ff 07 74 09 e8 76 66 3c f6 90 \u003c0f\u003e 0b 90 e8 6d 66 3c f6 48 89 df e8 e5 ad ff ff 31 ff 89 c5 89 c6\n RSP: 0018:ffffc900006cf338 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888031acd100 RCX: ffffffff8b7f2abf\n RDX: ffff88801e6ea440 RSI: ffffffff8b7f2aca RDI: 0000000000000005\n RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000007\n R10: 0000000000000004 R11: 0000000000002c10 R12: ffff88802ba69900\n R13: 1ffff920000d9e67 R14: ffff888046f81800 R15: 0000000000000004\n FS: 0000000000000000(0000) GS:ffff8880d69bc000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000560fc0ca1670 CR3: 0000000032c3a000 CR4: 0000000000352ef0\n Call Trace:\n \u003cTASK\u003e\n tcp_data_queue+0x13b0/0x4f90 net/ipv4/tcp_input.c:5197\n tcp_rcv_state_process+0xfdf/0x4ec0 net/ipv4/tcp_input.c:6922\n tcp_v6_do_rcv+0x492/0x1740 net/ipv6/tcp_ipv6.c:1672\n tcp_v6_rcv+0x2976/0x41e0 net/ipv6/tcp_ipv6.c:1918\n ip6_protocol_deliver_rcu+0x188/0x1520 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1e4/0x4b0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ip6_input+0x105/0x2f0 net/ipv6/ip6_input.c:500\n dst_input include/net/dst.h:471 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n NF_HOOK include/linux/netfilter.h:318 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5979\n __netif_receive_skb+0x1d/0x160 net/core/dev.c:6092\n process_backlog+0x442/0x15e0 net/core/dev.c:6444\n __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7494\n napi_poll net/core/dev.c:7557 [inline]\n net_rx_action+0xa9f/0xfe0 net/core/dev.c:7684\n handle_softirqs+0x216/0x8e0 kernel/softirq.c:579\n run_ksoftirqd kernel/softirq.c:968 [inline]\n run_ksoftirqd+0x3a/0x60 kernel/softirq.c:960\n smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160\n kthread+0x3c2/0x780 kernel/kthread.c:463\n ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \u003c/TASK\u003e\n\nThe TCP subflow can process the simult-connect syn-ack packet after\ntransitioning to TCP_FIN1 state, bypassing the MPTCP fallback check,\nas the sk_state_change() callback is not invoked for * -\u003e FIN_WAIT1\ntransitions.\n\nThat will move the msk socket to an inconsistent status and the next\nincoming data will hit the reported splat.\n\nClose the race moving the simult-fallback check at the earliest possible\nstage - that is at syn-ack generation time.\n\nAbout the fixes tags: [2] was supposed to also fix this issue introduced\nby [3]. [1] is required as a dependence: it was not explicitly marked as\na fix, but it is one and it has already been backported before [3]. In\nother words, this commit should be backported up to [3], including [2]\nand [1] if that\u0027s not already there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71088",
"url": "https://www.suse.com/security/cve/CVE-2025-71088"
},
{
"category": "external",
"summary": "SUSE Bug 1256630 for CVE-2025-71088",
"url": "https://bugzilla.suse.com/1256630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71088"
},
{
"cve": "CVE-2025-71089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu: disable SVA when CONFIG_X86 is set\n\nPatch series \"Fix stale IOTLB entries for kernel address space\", v7.\n\nThis proposes a fix for a security vulnerability related to IOMMU Shared\nVirtual Addressing (SVA). In an SVA context, an IOMMU can cache kernel\npage table entries. When a kernel page table page is freed and\nreallocated for another purpose, the IOMMU might still hold stale,\nincorrect entries. This can be exploited to cause a use-after-free or\nwrite-after-free condition, potentially leading to privilege escalation or\ndata corruption.\n\nThis solution introduces a deferred freeing mechanism for kernel page\ntable pages, which provides a safe window to notify the IOMMU to\ninvalidate its caches before the page is reused.\n\n\nThis patch (of 8):\n\nIn the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware\nshares and walks the CPU\u0027s page tables. The x86 architecture maps the\nkernel\u0027s virtual address space into the upper portion of every process\u0027s\npage table. Consequently, in an SVA context, the IOMMU hardware can walk\nand cache kernel page table entries.\n\nThe Linux kernel currently lacks a notification mechanism for kernel page\ntable changes, specifically when page table pages are freed and reused. \nThe IOMMU driver is only notified of changes to user virtual address\nmappings. This can cause the IOMMU\u0027s internal caches to retain stale\nentries for kernel VA.\n\nUse-After-Free (UAF) and Write-After-Free (WAF) conditions arise when\nkernel page table pages are freed and later reallocated. The IOMMU could\nmisinterpret the new data as valid page table entries. The IOMMU might\nthen walk into attacker-controlled memory, leading to arbitrary physical\nmemory DMA access or privilege escalation. This is also a\nWrite-After-Free issue, as the IOMMU will potentially continue to write\nAccessed and Dirty bits to the freed memory while attempting to walk the\nstale page tables.\n\nCurrently, SVA contexts are unprivileged and cannot access kernel\nmappings. However, the IOMMU will still walk kernel-only page tables all\nthe way down to the leaf entries, where it realizes the mapping is for the\nkernel and errors out. This means the IOMMU still caches these\nintermediate page table entries, making the described vulnerability a real\nconcern.\n\nDisable SVA on x86 architecture until the IOMMU can receive notification\nto flush the paging cache before freeing the CPU kernel page table pages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71089",
"url": "https://www.suse.com/security/cve/CVE-2025-71089"
},
{
"category": "external",
"summary": "SUSE Bug 1256612 for CVE-2025-71089",
"url": "https://bugzilla.suse.com/1256612"
},
{
"category": "external",
"summary": "SUSE Bug 1256615 for CVE-2025-71089",
"url": "https://bugzilla.suse.com/1256615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71089"
},
{
"cve": "CVE-2025-71091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: fix check for port enabled in team_queue_override_port_prio_changed()\n\nThere has been a syzkaller bug reported recently with the following\ntrace:\n\nlist_del corruption, ffff888058bea080-\u003eprev is LIST_POISON2 (dead000000000122)\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:59!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59\nCode: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 \u003c0f\u003e 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d49f370 EFLAGS: 00010286\nRAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000\nRDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005\nRBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230\nR13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480\nFS: 00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n __list_del_entry_valid include/linux/list.h:132 [inline]\n __list_del_entry include/linux/list.h:223 [inline]\n list_del_rcu include/linux/rculist.h:178 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]\n team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]\n team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534\n team_option_set drivers/net/team/team_core.c:376 [inline]\n team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653\n genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg net/socket.c:742 [inline]\n ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630\n ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684\n __sys_sendmsg+0x16d/0x220 net/socket.c:2716\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe problem is in this flow:\n1) Port is enabled, queue_id != 0, in qom_list\n2) Port gets disabled\n -\u003e team_port_disable()\n -\u003e team_queue_override_port_del()\n -\u003e del (removed from list)\n3) Port is disabled, queue_id != 0, not in any list\n4) Priority changes\n -\u003e team_queue_override_port_prio_changed()\n -\u003e checks: port disabled \u0026\u0026 queue_id != 0\n -\u003e calls del - hits the BUG as it is removed already\n\nTo fix this, change the check in team_queue_override_port_prio_changed()\nso it returns early if port is not enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71091",
"url": "https://www.suse.com/security/cve/CVE-2025-71091"
},
{
"category": "external",
"summary": "SUSE Bug 1256773 for CVE-2025-71091",
"url": "https://bugzilla.suse.com/1256773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71091"
},
{
"cve": "CVE-2025-71093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ne1000: fix OOB in e1000_tbi_should_accept()\n\nIn e1000_tbi_should_accept() we read the last byte of the frame via\n\u0027data[length - 1]\u0027 to evaluate the TBI workaround. If the descriptor-\nreported length is zero or larger than the actual RX buffer size, this\nread goes out of bounds and can hit unrelated slab objects. The issue\nis observed from the NAPI receive path (e1000_clean_rx_irq):\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790\nRead of size 1 at addr ffff888014114e54 by task sshd/363\n\nCPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x5a/0x74\n print_address_description+0x7b/0x440\n print_report+0x101/0x200\n kasan_report+0xc1/0xf0\n e1000_tbi_should_accept+0x610/0x790\n e1000_clean_rx_irq+0xa8c/0x1110\n e1000_clean+0xde2/0x3c10\n __napi_poll+0x98/0x380\n net_rx_action+0x491/0xa20\n __do_softirq+0x2c9/0x61d\n do_softirq+0xd1/0x120\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0xfe/0x130\n ip_finish_output2+0x7d5/0xb00\n __ip_queue_xmit+0xe24/0x1ab0\n __tcp_transmit_skb+0x1bcb/0x3340\n tcp_write_xmit+0x175d/0x6bd0\n __tcp_push_pending_frames+0x7b/0x280\n tcp_sendmsg_locked+0x2e4f/0x32d0\n tcp_sendmsg+0x24/0x40\n sock_write_iter+0x322/0x430\n vfs_write+0x56c/0xa60\n ksys_write+0xd1/0x190\n do_syscall_64+0x43/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f511b476b10\nCode: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24\nRSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10\nRDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003\nRBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00\nR10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003\n \u003c/TASK\u003e\nAllocated by task 1:\n __kasan_krealloc+0x131/0x1c0\n krealloc+0x90/0xc0\n add_sysfs_param+0xcb/0x8a0\n kernel_add_sysfs_param+0x81/0xd4\n param_sysfs_builtin+0x138/0x1a6\n param_sysfs_init+0x57/0x5b\n do_one_initcall+0x104/0x250\n do_initcall_level+0x102/0x132\n do_initcalls+0x46/0x74\n kernel_init_freeable+0x28f/0x393\n kernel_init+0x14/0x1a0\n ret_from_fork+0x22/0x30\nThe buggy address belongs to the object at ffff888014114000\n which belongs to the cache kmalloc-2k of size 2048\nThe buggy address is located 1620 bytes to the right of\n 2048-byte region [ffff888014114000, ffff888014114800]\nThe buggy address belongs to the physical page:\npage:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110\nhead:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x100000000010200(slab|head|node=0|zone=1)\nraw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000\nraw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n==================================================================\n\nThis happens because the TBI check unconditionally dereferences the last\nbyte without validating the reported length first:\n\n\tu8 last_byte = *(data + length - 1);\n\nFix by rejecting the frame early if the length is zero, or if it exceeds\nadapter-\u003erx_buffer_len. This preserves the TBI workaround semantics for\nvalid frames and prevents touching memory beyond the RX buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71093",
"url": "https://www.suse.com/security/cve/CVE-2025-71093"
},
{
"category": "external",
"summary": "SUSE Bug 1256777 for CVE-2025-71093",
"url": "https://bugzilla.suse.com/1256777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71093"
},
{
"cve": "CVE-2025-71094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: validate PHY address before use\n\nThe ASIX driver reads the PHY address from the USB device via\nasix_read_phy_addr(). A malicious or faulty device can return an\ninvalid address (\u003e= PHY_MAX_ADDR), which causes a warning in\nmdiobus_get_phy():\n\n addr 207 out of range\n WARNING: drivers/net/phy/mdio_bus.c:76\n\nValidate the PHY address in asix_read_phy_addr() and remove the\nnow-redundant check in ax88172a.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71094",
"url": "https://www.suse.com/security/cve/CVE-2025-71094"
},
{
"category": "external",
"summary": "SUSE Bug 1256597 for CVE-2025-71094",
"url": "https://bugzilla.suse.com/1256597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "low"
}
],
"title": "CVE-2025-71094"
},
{
"cve": "CVE-2025-71095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix the crash issue for zero copy XDP_TX action\n\nThere is a crash issue when running zero copy XDP_TX action, the crash\nlog is shown below.\n\n[ 216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000\n[ 216.187524] Internal error: Oops: 0000000096000144 [#1] SMP\n[ 216.301694] Call trace:\n[ 216.304130] dcache_clean_poc+0x20/0x38 (P)\n[ 216.308308] __dma_sync_single_for_device+0x1bc/0x1e0\n[ 216.313351] stmmac_xdp_xmit_xdpf+0x354/0x400\n[ 216.317701] __stmmac_xdp_run_prog+0x164/0x368\n[ 216.322139] stmmac_napi_poll_rxtx+0xba8/0xf00\n[ 216.326576] __napi_poll+0x40/0x218\n[ 216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt\n\nFor XDP_TX action, the xdp_buff is converted to xdp_frame by\nxdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame\ndepends on the memory type of the xdp_buff. For page pool based xdp_buff\nit produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy\nXSK pool based xdp_buff it produces xdp_frame with memory type\nMEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the\nmemory type and always uses the page pool type, this leads to invalid\nmappings and causes the crash. Therefore, check the xdp_buff memory type\nin stmmac_xdp_xmit_back() to fix this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71095",
"url": "https://www.suse.com/security/cve/CVE-2025-71095"
},
{
"category": "external",
"summary": "SUSE Bug 1256605 for CVE-2025-71095",
"url": "https://bugzilla.suse.com/1256605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71095"
},
{
"cve": "CVE-2025-71096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly\n\nThe netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a\nLS_NLA_TYPE_DGID attribute, it is invalid if it does not.\n\nUse the nl parsing logic properly and call nla_parse_deprecated() to fill\nthe nlattrs array and then directly index that array to get the data for\nthe DGID. Just fail if it is NULL.\n\nRemove the for loop searching for the nla, and squash the validation and\nparsing into one function.\n\nFixes an uninitialized read from the stack triggered by userspace if it\ndoes not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE\nquery.\n\n BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]\n BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n hex_byte_pack include/linux/hex.h:13 [inline]\n ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509\n ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633\n pointer+0xc09/0x1bd0 lib/vsprintf.c:2542\n vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930\n vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279\n vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426\n vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465\n vprintk+0x36/0x50 kernel/printk/printk_safe.c:82\n _printk+0x17e/0x1b0 kernel/printk/printk.c:2475\n ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]\n ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141\n rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]\n rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]\n rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:714 [inline]\n __sock_sendmsg+0x333/0x3d0 net/socket.c:729\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671\n __sys_sendmsg+0x1aa/0x300 net/socket.c:2703\n __compat_sys_sendmsg net/compat.c:346 [inline]\n __do_compat_sys_sendmsg net/compat.c:353 [inline]\n __se_compat_sys_sendmsg net/compat.c:350 [inline]\n __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350\n ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71096",
"url": "https://www.suse.com/security/cve/CVE-2025-71096"
},
{
"category": "external",
"summary": "SUSE Bug 1256606 for CVE-2025-71096",
"url": "https://bugzilla.suse.com/1256606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71096"
},
{
"cve": "CVE-2025-71097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: Fix reference count leak when using error routes with nexthop objects\n\nWhen a nexthop object is deleted, it is marked as dead and then\nfib_table_flush() is called to flush all the routes that are using the\ndead nexthop.\n\nThe current logic in fib_table_flush() is to only flush error routes\n(e.g., blackhole) when it is called as part of network namespace\ndismantle (i.e., with flush_all=true). Therefore, error routes are not\nflushed when their nexthop object is deleted:\n\n # ip link add name dummy1 up type dummy\n # ip nexthop add id 1 dev dummy1\n # ip route add 198.51.100.1/32 nhid 1\n # ip route add blackhole 198.51.100.2/32 nhid 1\n # ip nexthop del id 1\n # ip route show\n blackhole 198.51.100.2 nhid 1 dev dummy1\n\nAs such, they keep holding a reference on the nexthop object which in\nturn holds a reference on the nexthop device, resulting in a reference\ncount leak:\n\n # ip link del dev dummy1\n [ 70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2\n\nFix by flushing error routes when their nexthop is marked as dead.\n\nIPv6 does not suffer from this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71097",
"url": "https://www.suse.com/security/cve/CVE-2025-71097"
},
{
"category": "external",
"summary": "SUSE Bug 1256607 for CVE-2025-71097",
"url": "https://bugzilla.suse.com/1256607"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71097"
},
{
"cve": "CVE-2025-71098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_gre: make ip6gre_header() robust\n\nOver the years, syzbot found many ways to crash the kernel\nin ip6gre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ip6gre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0\n------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:213 !\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n neigh_output include/net/neighbour.h:556 [inline]\n ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136\n __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]\n ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71098",
"url": "https://www.suse.com/security/cve/CVE-2025-71098"
},
{
"category": "external",
"summary": "SUSE Bug 1256591 for CVE-2025-71098",
"url": "https://bugzilla.suse.com/1256591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71098"
},
{
"cve": "CVE-2025-71099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()\n\nIn xe_oa_add_config_ioctl(), we accessed oa_config-\u003eid after dropping\nmetrics_lock. Since this lock protects the lifetime of oa_config, an\nattacker could guess the id and call xe_oa_remove_config_ioctl() with\nperfect timing, freeing oa_config before we dereference it, leading to\na potential use-after-free.\n\nFix this by caching the id in a local variable while holding the lock.\n\nv2: (Matt A)\n- Dropped mutex_unlock(\u0026oa-\u003emetrics_lock) ordering change from\n xe_oa_remove_config_ioctl()\n\n(cherry picked from commit 28aeaed130e8e587fd1b73b6d66ca41ccc5a1a31)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71099",
"url": "https://www.suse.com/security/cve/CVE-2025-71099"
},
{
"category": "external",
"summary": "SUSE Bug 1256592 for CVE-2025-71099",
"url": "https://bugzilla.suse.com/1256592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71099"
},
{
"cve": "CVE-2025-71100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71100"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()\n\nTID getting from ieee80211_get_tid() might be out of range of array size\nof sta_entry-\u003etids[], so check TID is less than MAX_TID_COUNT. Othwerwise,\nUBSAN warn:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi/rtl8192cu/trx.c:514:30\n index 10 is out of range for type \u0027rtl_tid_data [9]\u0027",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71100",
"url": "https://www.suse.com/security/cve/CVE-2025-71100"
},
{
"category": "external",
"summary": "SUSE Bug 1256593 for CVE-2025-71100",
"url": "https://bugzilla.suse.com/1256593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71100"
},
{
"cve": "CVE-2025-71101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing\n\nThe hp_populate_*_elements_from_package() functions in the hp-bioscfg\ndriver contain out-of-bounds array access vulnerabilities.\n\nThese functions parse ACPI packages into internal data structures using\na for loop with index variable \u0027elem\u0027 that iterates through\nenum_obj/integer_obj/order_obj/password_obj/string_obj arrays.\n\nWhen processing multi-element fields like PREREQUISITES and\nENUM_POSSIBLE_VALUES, these functions read multiple consecutive array\nelements using expressions like \u0027enum_obj[elem + reqs]\u0027 and\n\u0027enum_obj[elem + pos_values]\u0027 within nested loops.\n\nThe bug is that the bounds check only validated elem, but did not consider\nthe additional offset when accessing elem + reqs or elem + pos_values.\n\nThe fix changes the bounds check to validate the actual accessed index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71101",
"url": "https://www.suse.com/security/cve/CVE-2025-71101"
},
{
"category": "external",
"summary": "SUSE Bug 1256594 for CVE-2025-71101",
"url": "https://bugzilla.suse.com/1256594"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71101"
},
{
"cve": "CVE-2025-71108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Handle incorrect num_connectors capability\n\nThe UCSI spec states that the num_connectors field is 7 bits, and the\n8th bit is reserved and should be set to zero.\nSome buggy FW has been known to set this bit, and it can lead to a\nsystem not booting.\nFlag that the FW is not behaving correctly, and auto-fix the value\nso that the system boots correctly.\n\nFound on Lenovo P1 G8 during Linux enablement program. The FW will\nbe fixed, but seemed worth addressing in case it hit platforms that\naren\u0027t officially Linux supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71108",
"url": "https://www.suse.com/security/cve/CVE-2025-71108"
},
{
"category": "external",
"summary": "SUSE Bug 1256774 for CVE-2025-71108",
"url": "https://bugzilla.suse.com/1256774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71108"
},
{
"cve": "CVE-2025-71111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Convert macros to functions to avoid TOCTOU\n\nThe macro FAN_FROM_REG evaluates its arguments multiple times. When used\nin lockless contexts involving shared driver data, this leads to\nTime-of-Check to Time-of-Use (TOCTOU) race conditions, potentially\ncausing divide-by-zero errors.\n\nConvert the macro to a static function. This guarantees that arguments\nare evaluated only once (pass-by-value), preventing the race\nconditions.\n\nAdditionally, in store_fan_div, move the calculation of the minimum\nlimit inside the update lock. This ensures that the read-modify-write\nsequence operates on consistent data.\n\nAdhere to the principle of minimal changes by only converting macros\nthat evaluate arguments multiple times and are used in lockless\ncontexts.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71111",
"url": "https://www.suse.com/security/cve/CVE-2025-71111"
},
{
"category": "external",
"summary": "SUSE Bug 1256728 for CVE-2025-71111",
"url": "https://bugzilla.suse.com/1256728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71111"
},
{
"cve": "CVE-2025-71112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: add VLAN id validation before using\n\nCurrently, the VLAN id may be used without validation when\nreceive a VLAN configuration mailbox from VF. The length of\nvlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause\nout-of-bounds memory access once the VLAN id is bigger than\nor equal to VLAN_N_VID.\n\nTherefore, VLAN id needs to be checked to ensure it is within\nthe range of VLAN_N_VID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71112",
"url": "https://www.suse.com/security/cve/CVE-2025-71112"
},
{
"category": "external",
"summary": "SUSE Bug 1256726 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "external",
"summary": "SUSE Bug 1256727 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71112"
},
{
"cve": "CVE-2025-71114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71114"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvia_wdt: fix critical boot hang due to unnamed resource allocation\n\nThe VIA watchdog driver uses allocate_resource() to reserve a MMIO\nregion for the watchdog control register. However, the allocated\nresource was not given a name, which causes the kernel resource tree\nto contain an entry marked as \"\u003cBAD\u003e\" under /proc/iomem on x86\nplatforms.\n\nDuring boot, this unnamed resource can lead to a critical hang because\nsubsequent resource lookups and conflict checks fail to handle the\ninvalid entry properly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71114",
"url": "https://www.suse.com/security/cve/CVE-2025-71114"
},
{
"category": "external",
"summary": "SUSE Bug 1256752 for CVE-2025-71114",
"url": "https://bugzilla.suse.com/1256752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71114"
},
{
"cve": "CVE-2025-71116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make decode_pool() more resilient against corrupted osdmaps\n\nIf the osdmap is (maliciously) corrupted such that the encoded length\nof ceph_pg_pool envelope is less than what is expected for a particular\nencoding version, out-of-bounds reads may ensue because the only bounds\ncheck that is there is based on that length value.\n\nThis patch adds explicit bounds checks for each field that is decoded\nor skipped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71116",
"url": "https://www.suse.com/security/cve/CVE-2025-71116"
},
{
"category": "external",
"summary": "SUSE Bug 1256744 for CVE-2025-71116",
"url": "https://bugzilla.suse.com/1256744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71116"
},
{
"cve": "CVE-2025-71118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPICA: Avoid walking the Namespace if start_node is NULL\n\nAlthough commit 0c9992315e73 (\"ACPICA: Avoid walking the ACPI Namespace\nif it is not there\") fixed the situation when both start_node and\nacpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed\non Honor Magicbook 14 Pro [1].\n\nThat happens due to the access to the member of parent_node in\nacpi_ns_get_next_node(). The NULL pointer dereference will always\nhappen, no matter whether or not the start_node is equal to\nACPI_ROOT_OBJECT, so move the check of start_node being NULL\nout of the if block.\n\nUnfortunately, all the attempts to contact Honor have failed, they\nrefused to provide any technical support for Linux.\n\nThe bad DSDT table\u0027s dump could be found on GitHub [2].\n\nDMI: HONOR FMB-P/FMB-P-PCB, BIOS 1.13 05/08/2025\n\n[ rjw: Subject adjustment, changelog edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71118",
"url": "https://www.suse.com/security/cve/CVE-2025-71118"
},
{
"category": "external",
"summary": "SUSE Bug 1256763 for CVE-2025-71118",
"url": "https://bugzilla.suse.com/1256763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71118"
},
{
"cve": "CVE-2025-71119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kexec: Enable SMT before waking offline CPUs\n\nIf SMT is disabled or a partial SMT state is enabled, when a new kernel\nimage is loaded for kexec, on reboot the following warning is observed:\n\nkexec: Waking offline cpu 228.\nWARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:223 kexec_prepare_cpus+0x1b0/0x1bc\n[snip]\n NIP kexec_prepare_cpus+0x1b0/0x1bc\n LR kexec_prepare_cpus+0x1a0/0x1bc\n Call Trace:\n kexec_prepare_cpus+0x1a0/0x1bc (unreliable)\n default_machine_kexec+0x160/0x19c\n machine_kexec+0x80/0x88\n kernel_kexec+0xd0/0x118\n __do_sys_reboot+0x210/0x2c4\n system_call_exception+0x124/0x320\n system_call_vectored_common+0x15c/0x2ec\n\nThis occurs as add_cpu() fails due to cpu_bootable() returning false for\nCPUs that fail the cpu_smt_thread_allowed() check or non primary\nthreads if SMT is disabled.\n\nFix the issue by enabling SMT and resetting the number of SMT threads to\nthe number of threads per core, before attempting to wake up all present\nCPUs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71119",
"url": "https://www.suse.com/security/cve/CVE-2025-71119"
},
{
"category": "external",
"summary": "SUSE Bug 1256730 for CVE-2025-71119",
"url": "https://bugzilla.suse.com/1256730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71119"
},
{
"cve": "CVE-2025-71120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf\n\nA zero length gss_token results in pages == 0 and in_token-\u003epages[0]\nis NULL. The code unconditionally evaluates\npage_address(in_token-\u003epages[0]) for the initial memcpy, which can\ndereference NULL even when the copy length is 0. Guard the first\nmemcpy so it only runs when length \u003e 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71120",
"url": "https://www.suse.com/security/cve/CVE-2025-71120"
},
{
"category": "external",
"summary": "SUSE Bug 1256779 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "external",
"summary": "SUSE Bug 1256780 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71120"
},
{
"cve": "CVE-2025-71123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix string copying in parse_apply_sb_mount_options()\n\nstrscpy_pad() can\u0027t be used to copy a non-NUL-term string into a NUL-term\nstring of possibly bigger size. Commit 0efc5990bca5 (\"string.h: Introduce\nmemtostr() and memtostr_pad()\") provides additional information in that\nregard. So if this happens, the following warning is observed:\n\nstrnlen: detected buffer overflow: 65 byte read of buffer size 64\nWARNING: CPU: 0 PID: 28655 at lib/string_helpers.c:1032 __fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nModules linked in:\nCPU: 0 UID: 0 PID: 28655 Comm: syz-executor.3 Not tainted 6.12.54-syzkaller-00144-g5f0270f1ba00 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:__fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nCall Trace:\n \u003cTASK\u003e\n __fortify_panic+0x1f/0x30 lib/string_helpers.c:1039\n strnlen include/linux/fortify-string.h:235 [inline]\n sized_strscpy include/linux/fortify-string.h:309 [inline]\n parse_apply_sb_mount_options fs/ext4/super.c:2504 [inline]\n __ext4_fill_super fs/ext4/super.c:5261 [inline]\n ext4_fill_super+0x3c35/0xad00 fs/ext4/super.c:5706\n get_tree_bdev_flags+0x387/0x620 fs/super.c:1636\n vfs_get_tree+0x93/0x380 fs/super.c:1814\n do_new_mount fs/namespace.c:3553 [inline]\n path_mount+0x6ae/0x1f70 fs/namespace.c:3880\n do_mount fs/namespace.c:3893 [inline]\n __do_sys_mount fs/namespace.c:4103 [inline]\n __se_sys_mount fs/namespace.c:4080 [inline]\n __x64_sys_mount+0x280/0x300 fs/namespace.c:4080\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x64/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nSince userspace is expected to provide s_mount_opts field to be at most 63\ncharacters long with the ending byte being NUL-term, use a 64-byte buffer\nwhich matches the size of s_mount_opts, so that strscpy_pad() does its job\nproperly. Return with error if the user still managed to provide a\nnon-NUL-term string here.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71123",
"url": "https://www.suse.com/security/cve/CVE-2025-71123"
},
{
"category": "external",
"summary": "SUSE Bug 1256757 for CVE-2025-71123",
"url": "https://bugzilla.suse.com/1256757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71123"
},
{
"cve": "CVE-2025-71130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71130"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer\n\nInitialize the eb.vma array with values of 0 when the eb structure is\nfirst set up. In particular, this sets the eb-\u003evma[i].vma pointers to\nNULL, simplifying cleanup and getting rid of the bug described below.\n\nDuring the execution of eb_lookup_vmas(), the eb-\u003evma array is\nsuccessively filled up with struct eb_vma objects. This process includes\ncalling eb_add_vma(), which might fail; however, even in the event of\nfailure, eb-\u003evma[i].vma is set for the currently processed buffer.\n\nIf eb_add_vma() fails, eb_lookup_vmas() returns with an error, which\nprompts a call to eb_release_vmas() to clean up the mess. Since\neb_lookup_vmas() might fail during processing any (possibly not first)\nbuffer, eb_release_vmas() checks whether a buffer\u0027s vma is NULL to know\nat what point did the lookup function fail.\n\nIn eb_lookup_vmas(), eb-\u003evma[i].vma is set to NULL if either the helper\nfunction eb_lookup_vma() or eb_validate_vma() fails. eb-\u003evma[i+1].vma is\nset to NULL in case i915_gem_object_userptr_submit_init() fails; the\ncurrent one needs to be cleaned up by eb_release_vmas() at this point,\nso the next one is set. If eb_add_vma() fails, neither the current nor\nthe next vma is set to NULL, which is a source of a NULL deref bug\ndescribed in the issue linked in the Closes tag.\n\nWhen entering eb_lookup_vmas(), the vma pointers are set to the slab\npoison value, instead of NULL. This doesn\u0027t matter for the actual\nlookup, since it gets overwritten anyway, however the eb_release_vmas()\nfunction only recognizes NULL as the stopping value, hence the pointers\nare being set to NULL as they go in case of intermediate failure. This\npatch changes the approach to filling them all with NULL at the start\ninstead, rather than handling that manually during failure.\n\n(cherry picked from commit 08889b706d4f0b8d2352b7ca29c2d8df4d0787cd)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71130",
"url": "https://www.suse.com/security/cve/CVE-2025-71130"
},
{
"category": "external",
"summary": "SUSE Bug 1256741 for CVE-2025-71130",
"url": "https://bugzilla.suse.com/1256741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71130"
},
{
"cve": "CVE-2025-71131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Do not use req-\u003eiv after crypto_aead_encrypt\n\nAs soon as crypto_aead_encrypt is called, the underlying request\nmay be freed by an asynchronous completion. Thus dereferencing\nreq-\u003eiv after it returns is invalid.\n\nInstead of checking req-\u003eiv against info, create a new variable\nunaligned_info and use it for that purpose instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71131",
"url": "https://www.suse.com/security/cve/CVE-2025-71131"
},
{
"category": "external",
"summary": "SUSE Bug 1256742 for CVE-2025-71131",
"url": "https://bugzilla.suse.com/1256742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71131"
},
{
"cve": "CVE-2025-71132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc91x: fix broken irq-context in PREEMPT_RT\n\nWhen smc91x.c is built with PREEMPT_RT, the following splat occurs\nin FVP_RevC:\n\n[ 13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000\n[ 13.062137] BUG: workqueue leaked atomic, lock or RCU: kworker/2:1[106]\n[ 13.062137] preempt=0x00000000 lock=0-\u003e0 RCU=0-\u003e1 workfn=mld_ifc_work\n[ 13.062266] C\n** replaying previous printk message **\n[ 13.062266] CPU: 2 UID: 0 PID: 106 Comm: kworker/2:1 Not tainted 6.18.0-dirty #179 PREEMPT_{RT,(full)}\n[ 13.062353] Hardware name: , BIOS\n[ 13.062382] Workqueue: mld mld_ifc_work\n[ 13.062469] Call trace:\n[ 13.062494] show_stack+0x24/0x40 (C)\n[ 13.062602] __dump_stack+0x28/0x48\n[ 13.062710] dump_stack_lvl+0x7c/0xb0\n[ 13.062818] dump_stack+0x18/0x34\n[ 13.062926] process_scheduled_works+0x294/0x450\n[ 13.063043] worker_thread+0x260/0x3d8\n[ 13.063124] kthread+0x1c4/0x228\n[ 13.063235] ret_from_fork+0x10/0x20\n\nThis happens because smc_special_trylock() disables IRQs even on PREEMPT_RT,\nbut smc_special_unlock() does not restore IRQs on PREEMPT_RT.\nThe reason is that smc_special_unlock() calls spin_unlock_irqrestore(),\nand rcu_read_unlock_bh() in __dev_queue_xmit() cannot invoke\nrcu_read_unlock() through __local_bh_enable_ip() when current-\u003esoftirq_disable_cnt becomes zero.\n\nTo address this issue, replace smc_special_trylock() with spin_trylock_irqsave().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71132",
"url": "https://www.suse.com/security/cve/CVE-2025-71132"
},
{
"category": "external",
"summary": "SUSE Bug 1256737 for CVE-2025-71132",
"url": "https://bugzilla.suse.com/1256737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71132"
},
{
"cve": "CVE-2025-71133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: avoid invalid read in irdma_net_event\n\nirdma_net_event() should not dereference anything from \"neigh\" (alias\n\"ptr\") until it has checked that the event is NETEVENT_NEIGH_UPDATE.\nOther events come with different structures pointed to by \"ptr\" and they\nmay be smaller than struct neighbour.\n\nMove the read of neigh-\u003edev under the NETEVENT_NEIGH_UPDATE case.\n\nThe bug is mostly harmless, but it triggers KASAN on debug kernels:\n\n BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma]\n Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554\n\n CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1\n Hardware name: [...]\n Workqueue: events rt6_probe_deferred\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x60/0xb0\n print_address_description.constprop.0+0x2c/0x3f0\n print_report+0xb4/0x270\n kasan_report+0x92/0xc0\n irdma_net_event+0x32e/0x3b0 [irdma]\n notifier_call_chain+0x9e/0x180\n atomic_notifier_call_chain+0x5c/0x110\n rt6_do_redirect+0xb91/0x1080\n tcp_v6_err+0xe9b/0x13e0\n icmpv6_notify+0x2b2/0x630\n ndisc_redirect_rcv+0x328/0x530\n icmpv6_rcv+0xc16/0x1360\n ip6_protocol_deliver_rcu+0xb84/0x12e0\n ip6_input_finish+0x117/0x240\n ip6_input+0xc4/0x370\n ipv6_rcv+0x420/0x7d0\n __netif_receive_skb_one_core+0x118/0x1b0\n process_backlog+0xd1/0x5d0\n __napi_poll.constprop.0+0xa3/0x440\n net_rx_action+0x78a/0xba0\n handle_softirqs+0x2d4/0x9c0\n do_softirq+0xad/0xe0\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71133",
"url": "https://www.suse.com/security/cve/CVE-2025-71133"
},
{
"category": "external",
"summary": "SUSE Bug 1256733 for CVE-2025-71133",
"url": "https://bugzilla.suse.com/1256733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71133"
},
{
"cve": "CVE-2025-71135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()\n\nThe variable mddev-\u003eprivate is first assigned to conf and then checked:\n\n conf = mddev-\u003eprivate;\n if (!conf) ...\n\nIf conf is NULL, then mddev-\u003eprivate is also NULL. In this case,\nnull-pointer dereferences can occur when calling raid5_quiesce():\n\n raid5_quiesce(mddev, true);\n raid5_quiesce(mddev, false);\n\nsince mddev-\u003eprivate is assigned to conf again in raid5_quiesce(), and conf\nis dereferenced in several places, for example:\n\n conf-\u003equiesce = 0;\n wake_up(\u0026conf-\u003ewait_for_quiescent);\n\nTo fix this issue, the function should unlock mddev and return before\ninvoking raid5_quiesce() when conf is NULL, following the existing pattern\nin raid5_change_consistency_policy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71135",
"url": "https://www.suse.com/security/cve/CVE-2025-71135"
},
{
"category": "external",
"summary": "SUSE Bug 1256761 for CVE-2025-71135",
"url": "https://bugzilla.suse.com/1256761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71135"
},
{
"cve": "CVE-2025-71136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()\n\nIt\u0027s possible for cp_read() and hdmi_read() to return -EIO. Those\nvalues are further used as indexes for accessing arrays.\n\nFix that by checking return values where it\u0027s needed.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71136",
"url": "https://www.suse.com/security/cve/CVE-2025-71136"
},
{
"category": "external",
"summary": "SUSE Bug 1256759 for CVE-2025-71136",
"url": "https://bugzilla.suse.com/1256759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71136"
},
{
"cve": "CVE-2025-71137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71137"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: fix \"UBSAN: shift-out-of-bounds error\"\n\nThis patch ensures that the RX ring size (rx_pending) is not\nset below the permitted length. This avoids UBSAN\nshift-out-of-bounds errors when users passes small or zero\nring sizes via ethtool -G.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71137",
"url": "https://www.suse.com/security/cve/CVE-2025-71137"
},
{
"category": "external",
"summary": "SUSE Bug 1256760 for CVE-2025-71137",
"url": "https://bugzilla.suse.com/1256760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71137"
},
{
"cve": "CVE-2025-71138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71138"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add missing NULL pointer check for pingpong interface\n\nIt is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a\nsingle place the check is missing.\nAlso use convenient locals instead of phys_enc-\u003e* where available.\n\nPatchwork: https://patchwork.freedesktop.org/patch/693860/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71138",
"url": "https://www.suse.com/security/cve/CVE-2025-71138"
},
{
"category": "external",
"summary": "SUSE Bug 1256785 for CVE-2025-71138",
"url": "https://bugzilla.suse.com/1256785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71138"
},
{
"cve": "CVE-2025-71141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tilcdc: Fix removal actions in case of failed probe\n\nThe drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers\nshould only be called when the device has been successfully registered.\nCurrently, these functions are called unconditionally in tilcdc_fini(),\nwhich causes warnings during probe deferral scenarios.\n\n[ 7.972317] WARNING: CPU: 0 PID: 23 at drivers/gpu/drm/drm_atomic_state_helper.c:175 drm_atomic_helper_crtc_duplicate_state+0x60/0x68\n...\n[ 8.005820] drm_atomic_helper_crtc_duplicate_state from drm_atomic_get_crtc_state+0x68/0x108\n[ 8.005858] drm_atomic_get_crtc_state from drm_atomic_helper_disable_all+0x90/0x1c8\n[ 8.005885] drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x90/0x144\n[ 8.005911] drm_atomic_helper_shutdown from tilcdc_fini+0x68/0xf8 [tilcdc]\n[ 8.005957] tilcdc_fini [tilcdc] from tilcdc_pdev_probe+0xb0/0x6d4 [tilcdc]\n\nFix this by rewriting the failed probe cleanup path using the standard\ngoto error handling pattern, which ensures that cleanup functions are\nonly called on successfully initialized resources. Additionally, remove\nthe now-unnecessary is_registered flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71141",
"url": "https://www.suse.com/security/cve/CVE-2025-71141"
},
{
"category": "external",
"summary": "SUSE Bug 1256756 for CVE-2025-71141",
"url": "https://bugzilla.suse.com/1256756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71141"
},
{
"cve": "CVE-2025-71142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpuset: fix warning when disabling remote partition\n\nA warning was triggered as follows:\n\nWARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110\nRIP: 0010:remote_partition_disable+0xf7/0x110\nRSP: 0018:ffffc90001947d88 EFLAGS: 00000206\nRAX: 0000000000007fff RBX: ffff888103b6e000 RCX: 0000000000006f40\nRDX: 0000000000006f00 RSI: ffffc90001947da8 RDI: ffff888103b6e000\nRBP: ffff888103b6e000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: ffff88810b2e2728 R12: ffffc90001947da8\nR13: 0000000000000000 R14: ffffc90001947da8 R15: ffff8881081f1c00\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f55c8bbe0b2 CR3: 000000010b14c000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n update_prstate+0x2d3/0x580\n cpuset_partition_write+0x94/0xf0\n kernfs_fop_write_iter+0x147/0x200\n vfs_write+0x35d/0x500\n ksys_write+0x66/0xe0\n do_syscall_64+0x6b/0x390\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7f55c8cd4887\n\nReproduction steps (on a 16-CPU machine):\n\n # cd /sys/fs/cgroup/\n # mkdir A1\n # echo +cpuset \u003e A1/cgroup.subtree_control\n # echo \"0-14\" \u003e A1/cpuset.cpus.exclusive\n # mkdir A1/A2\n # echo \"0-14\" \u003e A1/A2/cpuset.cpus.exclusive\n # echo \"root\" \u003e A1/A2/cpuset.cpus.partition\n # echo 0 \u003e /sys/devices/system/cpu/cpu15/online\n # echo member \u003e A1/A2/cpuset.cpus.partition\n\nWhen CPU 15 is offlined, subpartitions_cpus gets cleared because no CPUs\nremain available for the top_cpuset, forcing partitions to share CPUs with\nthe top_cpuset. In this scenario, disabling the remote partition triggers\na warning stating that effective_xcpus is not a subset of\nsubpartitions_cpus. Partitions should be invalidated in this case to\ninform users that the partition is now invalid(cpus are shared with\ntop_cpuset).\n\nTo fix this issue:\n1. Only emit the warning only if subpartitions_cpus is not empty and the\n effective_xcpus is not a subset of subpartitions_cpus.\n2. During the CPU hotplug process, invalidate partitions if\n subpartitions_cpus is empty.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71142",
"url": "https://www.suse.com/security/cve/CVE-2025-71142"
},
{
"category": "external",
"summary": "SUSE Bug 1256748 for CVE-2025-71142",
"url": "https://bugzilla.suse.com/1256748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71142"
},
{
"cve": "CVE-2025-71143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71143"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: samsung: exynos-clkout: Assign .num before accessing .hws\n\nCommit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with\n__counted_by\") annotated the hws member of \u0027struct clk_hw_onecell_data\u0027\nwith __counted_by, which informs the bounds sanitizer (UBSAN_BOUNDS)\nabout the number of elements in .hws[], so that it can warn when .hws[]\nis accessed out of bounds. As noted in that change, the __counted_by\nmember must be initialized with the number of elements before the first\narray access happens, otherwise there will be a warning from each access\nprior to the initialization because the number of elements is zero. This\noccurs in exynos_clkout_probe() due to .num being assigned after .hws[]\nhas been accessed:\n\n UBSAN: array-index-out-of-bounds in drivers/clk/samsung/clk-exynos-clkout.c:178:18\n index 0 is out of range for type \u0027clk_hw *[*]\u0027\n\nMove the .num initialization to before the first access of .hws[],\nclearing up the warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71143",
"url": "https://www.suse.com/security/cve/CVE-2025-71143"
},
{
"category": "external",
"summary": "SUSE Bug 1256749 for CVE-2025-71143",
"url": "https://bugzilla.suse.com/1256749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71143"
},
{
"cve": "CVE-2025-71145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: phy: isp1301: fix non-OF device reference imbalance\n\nA recent change fixing a device reference leak in a UDC driver\nintroduced a potential use-after-free in the non-OF case as the\nisp1301_get_client() helper only increases the reference count for the\nreturned I2C device in the OF case.\n\nIncrement the reference count also for non-OF so that the caller can\ndecrement it unconditionally.\n\nNote that this is inherently racy just as using the returned I2C device\nis since nothing is preventing the PHY driver from being unbound while\nin use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71145",
"url": "https://www.suse.com/security/cve/CVE-2025-71145"
},
{
"category": "external",
"summary": "SUSE Bug 1257155 for CVE-2025-71145",
"url": "https://bugzilla.suse.com/1257155"
},
{
"category": "external",
"summary": "SUSE Bug 1257156 for CVE-2025-71145",
"url": "https://bugzilla.suse.com/1257156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2025-71145"
},
{
"cve": "CVE-2025-71147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71147"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix a memory leak in tpm2_load_cmd\n\n\u0027tpm2_load_cmd\u0027 allocates a tempoary blob indirectly via \u0027tpm2_key_decode\u0027\nbut it is not freed in the failure paths. Address this by wrapping the blob\ninto with a cleanup helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71147",
"url": "https://www.suse.com/security/cve/CVE-2025-71147"
},
{
"category": "external",
"summary": "SUSE Bug 1257158 for CVE-2025-71147",
"url": "https://bugzilla.suse.com/1257158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71147"
},
{
"cve": "CVE-2025-71149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: correctly handle io_poll_add() return value on update\n\nWhen the core of io_uring was updated to handle completions\nconsistently and with fixed return codes, the POLL_REMOVE opcode\nwith updates got slightly broken. If a POLL_ADD is pending and\nthen POLL_REMOVE is used to update the events of that request, if that\nupdate causes the POLL_ADD to now trigger, then that completion is lost\nand a CQE is never posted.\n\nAdditionally, ensure that if an update does cause an existing POLL_ADD\nto complete, that the completion value isn\u0027t always overwritten with\n-ECANCELED. For that case, whatever io_poll_add() set the value to\nshould just be retained.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71149",
"url": "https://www.suse.com/security/cve/CVE-2025-71149"
},
{
"category": "external",
"summary": "SUSE Bug 1257164 for CVE-2025-71149",
"url": "https://bugzilla.suse.com/1257164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71149"
},
{
"cve": "CVE-2025-71154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: rtl8150: fix memory leak on usb_submit_urb() failure\n\nIn async_set_registers(), when usb_submit_urb() fails, the allocated\n async_req structure and URB are not freed, causing a memory leak.\n\n The completion callback async_set_reg_cb() is responsible for freeing\n these allocations, but it is only called after the URB is successfully\n submitted and completes (successfully or with error). If submission\n fails, the callback never runs and the memory is leaked.\n\n Fix this by freeing both the URB and the request structure in the error\n path when usb_submit_urb() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71154",
"url": "https://www.suse.com/security/cve/CVE-2025-71154"
},
{
"category": "external",
"summary": "SUSE Bug 1257163 for CVE-2025-71154",
"url": "https://bugzilla.suse.com/1257163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71154"
},
{
"cve": "CVE-2025-71156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: defer interrupt enabling until NAPI registration\n\nCurrently, interrupts are automatically enabled immediately upon\nrequest. This allows interrupt to fire before the associated NAPI\ncontext is fully initialized and cause failures like below:\n\n[ 0.946369] Call Trace:\n[ 0.946369] \u003cIRQ\u003e\n[ 0.946369] __napi_poll+0x2a/0x1e0\n[ 0.946369] net_rx_action+0x2f9/0x3f0\n[ 0.946369] handle_softirqs+0xd6/0x2c0\n[ 0.946369] ? handle_edge_irq+0xc1/0x1b0\n[ 0.946369] __irq_exit_rcu+0xc3/0xe0\n[ 0.946369] common_interrupt+0x81/0xa0\n[ 0.946369] \u003c/IRQ\u003e\n[ 0.946369] \u003cTASK\u003e\n[ 0.946369] asm_common_interrupt+0x22/0x40\n[ 0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10\n\nUse the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto\nenablement and explicitly enable the interrupt in NAPI initialization\npath (and disable it during NAPI teardown).\n\nThis ensures that interrupt lifecycle is strictly coupled with\nreadiness of NAPI context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71156",
"url": "https://www.suse.com/security/cve/CVE-2025-71156"
},
{
"category": "external",
"summary": "SUSE Bug 1257167 for CVE-2025-71156",
"url": "https://bugzilla.suse.com/1257167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71156"
},
{
"cve": "CVE-2025-71157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: always drop device refcount in ib_del_sub_device_and_put()\n\nSince nldev_deldev() (introduced by commit 060c642b2ab8 (\"RDMA/nldev: Add\nsupport to add/delete a sub IB device through netlink\") grabs a reference\nusing ib_device_get_by_index() before calling ib_del_sub_device_and_put(),\nwe need to drop that reference before returning -EOPNOTSUPP error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71157",
"url": "https://www.suse.com/security/cve/CVE-2025-71157"
},
{
"category": "external",
"summary": "SUSE Bug 1257168 for CVE-2025-71157",
"url": "https://bugzilla.suse.com/1257168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71157"
},
{
"cve": "CVE-2025-71162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: tegra-adma: Fix use-after-free\n\nA use-after-free bug exists in the Tegra ADMA driver when audio streams\nare terminated, particularly during XRUN conditions. The issue occurs\nwhen the DMA buffer is freed by tegra_adma_terminate_all() before the\nvchan completion tasklet finishes accessing it.\n\nThe race condition follows this sequence:\n\n 1. DMA transfer completes, triggering an interrupt that schedules the\n completion tasklet (tasklet has not executed yet)\n 2. Audio playback stops, calling tegra_adma_terminate_all() which\n frees the DMA buffer memory via kfree()\n 3. The scheduled tasklet finally executes, calling vchan_complete()\n which attempts to access the already-freed memory\n\nSince tasklets can execute at any time after being scheduled, there is\nno guarantee that the buffer will remain valid when vchan_complete()\nruns.\n\nFix this by properly synchronizing the virtual channel completion:\n - Calling vchan_terminate_vdesc() in tegra_adma_stop() to mark the\n descriptors as terminated instead of freeing the descriptor.\n - Add the callback tegra_adma_synchronize() that calls\n vchan_synchronize() which kills any pending tasklets and frees any\n terminated descriptors.\n\nCrash logs:\n[ 337.427523] BUG: KASAN: use-after-free in vchan_complete+0x124/0x3b0\n[ 337.427544] Read of size 8 at addr ffff000132055428 by task swapper/0/0\n\n[ 337.427562] Call trace:\n[ 337.427564] dump_backtrace+0x0/0x320\n[ 337.427571] show_stack+0x20/0x30\n[ 337.427575] dump_stack_lvl+0x68/0x84\n[ 337.427584] print_address_description.constprop.0+0x74/0x2b8\n[ 337.427590] kasan_report+0x1f4/0x210\n[ 337.427598] __asan_load8+0xa0/0xd0\n[ 337.427603] vchan_complete+0x124/0x3b0\n[ 337.427609] tasklet_action_common.constprop.0+0x190/0x1d0\n[ 337.427617] tasklet_action+0x30/0x40\n[ 337.427623] __do_softirq+0x1a0/0x5c4\n[ 337.427628] irq_exit+0x110/0x140\n[ 337.427633] handle_domain_irq+0xa4/0xe0\n[ 337.427640] gic_handle_irq+0x64/0x160\n[ 337.427644] call_on_irq_stack+0x20/0x4c\n[ 337.427649] do_interrupt_handler+0x7c/0x90\n[ 337.427654] el1_interrupt+0x30/0x80\n[ 337.427659] el1h_64_irq_handler+0x18/0x30\n[ 337.427663] el1h_64_irq+0x7c/0x80\n[ 337.427667] cpuidle_enter_state+0xe4/0x540\n[ 337.427674] cpuidle_enter+0x54/0x80\n[ 337.427679] do_idle+0x2e0/0x380\n[ 337.427685] cpu_startup_entry+0x2c/0x70\n[ 337.427690] rest_init+0x114/0x130\n[ 337.427695] arch_call_rest_init+0x18/0x24\n[ 337.427702] start_kernel+0x380/0x3b4\n[ 337.427706] __primary_switched+0xc0/0xc8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71162",
"url": "https://www.suse.com/security/cve/CVE-2025-71162"
},
{
"category": "external",
"summary": "SUSE Bug 1257204 for CVE-2025-71162",
"url": "https://bugzilla.suse.com/1257204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71162"
},
{
"cve": "CVE-2025-71163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: fix device leaks on compat bind and unbind\n\nMake sure to drop the reference taken when looking up the idxd device as\npart of the compat bind and unbind sysfs interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71163",
"url": "https://www.suse.com/security/cve/CVE-2025-71163"
},
{
"category": "external",
"summary": "SUSE Bug 1257215 for CVE-2025-71163",
"url": "https://bugzilla.suse.com/1257215"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-71163"
},
{
"cve": "CVE-2026-22976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset\n\n`qfq_class-\u003eleaf_qdisc-\u003eq.qlen \u003e 0` does not imply that the class\nitself is active.\n\nTwo qfq_class objects may point to the same leaf_qdisc. This happens\nwhen:\n\n1. one QFQ qdisc is attached to the dev as the root qdisc, and\n\n2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()\n/ qdisc_put()) and is pending to be destroyed, as in function\ntc_new_tfilter.\n\nWhen packets are enqueued through the root QFQ qdisc, the shared\nleaf_qdisc-\u003eq.qlen increases. At the same time, the second QFQ\nqdisc triggers qdisc_put and qdisc_destroy: the qdisc enters\nqfq_reset() with its own q-\u003eq.qlen == 0, but its class\u0027s leaf\nqdisc-\u003eq.qlen \u003e 0. Therefore, the qfq_reset would wrongly deactivate\nan inactive aggregate and trigger a null-deref in qfq_deactivate_agg:\n\n[ 0.903172] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 0.903571] #PF: supervisor write access in kernel mode\n[ 0.903860] #PF: error_code(0x0002) - not-present page\n[ 0.904177] PGD 10299b067 P4D 10299b067 PUD 10299c067 PMD 0\n[ 0.904502] Oops: Oops: 0002 [#1] SMP NOPTI\n[ 0.904737] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.19.0-rc3+ #2 NONE\n[ 0.905157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014\n[ 0.905754] RIP: 0010:qfq_deactivate_agg (include/linux/list.h:992 (discriminator 2) include/linux/list.h:1006 (discriminator 2) net/sched/sch_qfq.c:1367 (discriminator 2) net/sched/sch_qfq.c:1393 (discriminator 2))\n[ 0.906046] Code: 0f 84 4d 01 00 00 48 89 70 18 8b 4b 10 48 c7 c2 ff ff ff ff 48 8b 78 08 48 d3 e2 48 21 f2 48 2b 13 48 8b 30 48 d3 ea 8b 4b 18 0\n\nCode starting with the faulting instruction\n===========================================\n 0:\t0f 84 4d 01 00 00 \tje 0x153\n 6:\t48 89 70 18 \tmov %rsi,0x18(%rax)\n a:\t8b 4b 10 \tmov 0x10(%rbx),%ecx\n d:\t48 c7 c2 ff ff ff ff \tmov $0xffffffffffffffff,%rdx\n 14:\t48 8b 78 08 \tmov 0x8(%rax),%rdi\n 18:\t48 d3 e2 \tshl %cl,%rdx\n 1b:\t48 21 f2 \tand %rsi,%rdx\n 1e:\t48 2b 13 \tsub (%rbx),%rdx\n 21:\t48 8b 30 \tmov (%rax),%rsi\n 24:\t48 d3 ea \tshr %cl,%rdx\n 27:\t8b 4b 18 \tmov 0x18(%rbx),%ecx\n\t...\n[ 0.907095] RSP: 0018:ffffc900004a39a0 EFLAGS: 00010246\n[ 0.907368] RAX: ffff8881043a0880 RBX: ffff888102953340 RCX: 0000000000000000\n[ 0.907723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 0.908100] RBP: ffff888102952180 R08: 0000000000000000 R09: 0000000000000000\n[ 0.908451] R10: ffff8881043a0000 R11: 0000000000000000 R12: ffff888102952000\n[ 0.908804] R13: ffff888102952180 R14: ffff8881043a0ad8 R15: ffff8881043a0880\n[ 0.909179] FS: 000000002a1a0380(0000) GS:ffff888196d8d000(0000) knlGS:0000000000000000\n[ 0.909572] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 0.909857] CR2: 0000000000000000 CR3: 0000000102993002 CR4: 0000000000772ef0\n[ 0.910247] PKRU: 55555554\n[ 0.910391] Call Trace:\n[ 0.910527] \u003cTASK\u003e\n[ 0.910638] qfq_reset_qdisc (net/sched/sch_qfq.c:357 net/sched/sch_qfq.c:1485)\n[ 0.910826] qdisc_reset (include/linux/skbuff.h:2195 include/linux/skbuff.h:2501 include/linux/skbuff.h:3424 include/linux/skbuff.h:3430 net/sched/sch_generic.c:1036)\n[ 0.911040] __qdisc_destroy (net/sched/sch_generic.c:1076)\n[ 0.911236] tc_new_tfilter (net/sched/cls_api.c:2447)\n[ 0.911447] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958)\n[ 0.911663] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6861)\n[ 0.911894] netlink_rcv_skb (net/netlink/af_netlink.c:2550)\n[ 0.912100] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)\n[ 0.912296] ? __alloc_skb (net/core/skbuff.c:706)\n[ 0.912484] netlink_sendmsg (net/netlink/af\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22976",
"url": "https://www.suse.com/security/cve/CVE-2026-22976"
},
{
"category": "external",
"summary": "SUSE Bug 1257035 for CVE-2026-22976",
"url": "https://bugzilla.suse.com/1257035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22976"
},
{
"cve": "CVE-2026-22977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22977"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sock: fix hardened usercopy panic in sock_recv_errqueue\n\nskbuff_fclone_cache was created without defining a usercopy region,\n[1] unlike skbuff_head_cache which properly whitelists the cb[] field.\n[2] This causes a usercopy BUG() when CONFIG_HARDENED_USERCOPY is\nenabled and the kernel attempts to copy sk_buff.cb data to userspace\nvia sock_recv_errqueue() -\u003e put_cmsg().\n\nThe crash occurs when: 1. TCP allocates an skb using alloc_skb_fclone()\n (from skbuff_fclone_cache) [1]\n2. The skb is cloned via skb_clone() using the pre-allocated fclone\n[3] 3. The cloned skb is queued to sk_error_queue for timestamp\nreporting 4. Userspace reads the error queue via recvmsg(MSG_ERRQUEUE)\n5. sock_recv_errqueue() calls put_cmsg() to copy serr-\u003eee from skb-\u003ecb\n[4] 6. __check_heap_object() fails because skbuff_fclone_cache has no\n usercopy whitelist [5]\n\nWhen cloned skbs allocated from skbuff_fclone_cache are used in the\nsocket error queue, accessing the sock_exterr_skb structure in skb-\u003ecb\nvia put_cmsg() triggers a usercopy hardening violation:\n\n[ 5.379589] usercopy: Kernel memory exposure attempt detected from SLUB object \u0027skbuff_fclone_cache\u0027 (offset 296, size 16)!\n[ 5.382796] kernel BUG at mm/usercopy.c:102!\n[ 5.383923] Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\n[ 5.384903] CPU: 1 UID: 0 PID: 138 Comm: poc_put_cmsg Not tainted 6.12.57 #7\n[ 5.384903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 5.384903] RIP: 0010:usercopy_abort+0x6c/0x80\n[ 5.384903] Code: 1a 86 51 48 c7 c2 40 15 1a 86 41 52 48 c7 c7 c0 15 1a 86 48 0f 45 d6 48 c7 c6 80 15 1a 86 48 89 c1 49 0f 45 f3 e8 84 27 88 ff \u003c0f\u003e 0b 490\n[ 5.384903] RSP: 0018:ffffc900006f77a8 EFLAGS: 00010246\n[ 5.384903] RAX: 000000000000006f RBX: ffff88800f0ad2a8 RCX: 1ffffffff0f72e74\n[ 5.384903] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff87b973a0\n[ 5.384903] RBP: 0000000000000010 R08: 0000000000000000 R09: fffffbfff0f72e74\n[ 5.384903] R10: 0000000000000003 R11: 79706f6372657375 R12: 0000000000000001\n[ 5.384903] R13: ffff88800f0ad2b8 R14: ffffea00003c2b40 R15: ffffea00003c2b00\n[ 5.384903] FS: 0000000011bc4380(0000) GS:ffff8880bf100000(0000) knlGS:0000000000000000\n[ 5.384903] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 5.384903] CR2: 000056aa3b8e5fe4 CR3: 000000000ea26004 CR4: 0000000000770ef0\n[ 5.384903] PKRU: 55555554\n[ 5.384903] Call Trace:\n[ 5.384903] \u003cTASK\u003e\n[ 5.384903] __check_heap_object+0x9a/0xd0\n[ 5.384903] __check_object_size+0x46c/0x690\n[ 5.384903] put_cmsg+0x129/0x5e0\n[ 5.384903] sock_recv_errqueue+0x22f/0x380\n[ 5.384903] tls_sw_recvmsg+0x7ed/0x1960\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 5.384903] ? schedule+0x6d/0x270\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 5.384903] ? mutex_unlock+0x81/0xd0\n[ 5.384903] ? __pfx_mutex_unlock+0x10/0x10\n[ 5.384903] ? __pfx_tls_sw_recvmsg+0x10/0x10\n[ 5.384903] ? _raw_spin_lock_irqsave+0x8f/0xf0\n[ 5.384903] ? _raw_read_unlock_irqrestore+0x20/0x40\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n\nThe crash offset 296 corresponds to skb2-\u003ecb within skbuff_fclones:\n - sizeof(struct sk_buff) = 232 - offsetof(struct sk_buff, cb) = 40 -\n offset of skb2.cb in fclones = 232 + 40 = 272 - crash offset 296 =\n 272 + 24 (inside sock_exterr_skb.ee)\n\nThis patch uses a local stack variable as a bounce buffer to avoid the hardened usercopy check failure.\n\n[1] https://elixir.bootlin.com/linux/v6.12.62/source/net/ipv4/tcp.c#L885\n[2] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5104\n[3] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5566\n[4] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5491\n[5] https://elixir.bootlin.com/linux/v6.12.62/source/mm/slub.c#L5719",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22977",
"url": "https://www.suse.com/security/cve/CVE-2026-22977"
},
{
"category": "external",
"summary": "SUSE Bug 1257053 for CVE-2026-22977",
"url": "https://bugzilla.suse.com/1257053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22977"
},
{
"cve": "CVE-2026-22978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: avoid kernel-infoleak from struct iw_point\n\nstruct iw_point has a 32bit hole on 64bit arches.\n\nstruct iw_point {\n void __user *pointer; /* Pointer to the data (in user space) */\n __u16 length; /* number of fields or size in bytes */\n __u16 flags; /* Optional params */\n};\n\nMake sure to zero the structure to avoid disclosing 32bits of kernel data\nto user space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22978",
"url": "https://www.suse.com/security/cve/CVE-2026-22978"
},
{
"category": "external",
"summary": "SUSE Bug 1257227 for CVE-2026-22978",
"url": "https://bugzilla.suse.com/1257227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22978"
},
{
"cve": "CVE-2026-22984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: prevent potential out-of-bounds reads in handle_auth_done()\n\nPerform an explicit bounds check on payload_len to avoid a possible\nout-of-bounds access in the callout.\n\n[ idryomov: changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22984",
"url": "https://www.suse.com/security/cve/CVE-2026-22984"
},
{
"category": "external",
"summary": "SUSE Bug 1257217 for CVE-2026-22984",
"url": "https://bugzilla.suse.com/1257217"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22984"
},
{
"cve": "CVE-2026-22985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22985"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: Fix RSS LUT NULL pointer crash on early ethtool operations\n\nThe RSS LUT is not initialized until the interface comes up, causing\nthe following NULL pointer crash when ethtool operations like rxhash on/off\nare performed before the interface is brought up for the first time.\n\nMove RSS LUT initialization from ndo_open to vport creation to ensure LUT\nis always available. This enables RSS configuration via ethtool before\nbringing the interface up. Simplify LUT management by maintaining all\nchanges in the driver\u0027s soft copy and programming zeros to the indirection\ntable when rxhash is disabled. Defer HW programming until the interface\ncomes up if it is down during rxhash and LUT configuration changes.\n\nSteps to reproduce:\n** Load idpf driver; interfaces will be created\n\tmodprobe idpf\n** Before bringing the interfaces up, turn rxhash off\n\tethtool -K eth2 rxhash off\n\n[89408.371875] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[89408.371908] #PF: supervisor read access in kernel mode\n[89408.371924] #PF: error_code(0x0000) - not-present page\n[89408.371940] PGD 0 P4D 0\n[89408.371953] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003csnip\u003e\n[89408.372052] RIP: 0010:memcpy_orig+0x16/0x130\n[89408.372310] Call Trace:\n[89408.372317] \u003cTASK\u003e\n[89408.372326] ? idpf_set_features+0xfc/0x180 [idpf]\n[89408.372363] __netdev_update_features+0x295/0xde0\n[89408.372384] ethnl_set_features+0x15e/0x460\n[89408.372406] genl_family_rcv_msg_doit+0x11f/0x180\n[89408.372429] genl_rcv_msg+0x1ad/0x2b0\n[89408.372446] ? __pfx_ethnl_set_features+0x10/0x10\n[89408.372465] ? __pfx_genl_rcv_msg+0x10/0x10\n[89408.372482] netlink_rcv_skb+0x58/0x100\n[89408.372502] genl_rcv+0x2c/0x50\n[89408.372516] netlink_unicast+0x289/0x3e0\n[89408.372533] netlink_sendmsg+0x215/0x440\n[89408.372551] __sys_sendto+0x234/0x240\n[89408.372571] __x64_sys_sendto+0x28/0x30\n[89408.372585] x64_sys_call+0x1909/0x1da0\n[89408.372604] do_syscall_64+0x7a/0xfa0\n[89408.373140] ? clear_bhb_loop+0x60/0xb0\n[89408.373647] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[89408.378887] \u003c/TASK\u003e\n\u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22985",
"url": "https://www.suse.com/security/cve/CVE-2026-22985"
},
{
"category": "external",
"summary": "SUSE Bug 1257277 for CVE-2026-22985",
"url": "https://bugzilla.suse.com/1257277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22985"
},
{
"cve": "CVE-2026-22988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22988"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: do not assume dev_hard_header() does not change skb-\u003ehead\n\narp_create() is the only dev_hard_header() caller\nmaking assumption about skb-\u003ehead being unchanged.\n\nA recent commit broke this assumption.\n\nInitialize @arp pointer after dev_hard_header() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22988",
"url": "https://www.suse.com/security/cve/CVE-2026-22988"
},
{
"category": "external",
"summary": "SUSE Bug 1257282 for CVE-2026-22988",
"url": "https://bugzilla.suse.com/1257282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22988"
},
{
"cve": "CVE-2026-22990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace overzealous BUG_ON in osdmap_apply_incremental()\n\nIf the osdmap is (maliciously) corrupted such that the incremental\nosdmap epoch is different from what is expected, there is no need to\nBUG. Instead, just declare the incremental osdmap to be invalid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22990",
"url": "https://www.suse.com/security/cve/CVE-2026-22990"
},
{
"category": "external",
"summary": "SUSE Bug 1257221 for CVE-2026-22990",
"url": "https://bugzilla.suse.com/1257221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22990"
},
{
"cve": "CVE-2026-22991",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22991"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make free_choose_arg_map() resilient to partial allocation\n\nfree_choose_arg_map() may dereference a NULL pointer if its caller fails\nafter a partial allocation.\n\nFor example, in decode_choose_args(), if allocation of arg_map-\u003eargs\nfails, execution jumps to the fail label and free_choose_arg_map() is\ncalled. Since arg_map-\u003esize is updated to a non-zero value before memory\nallocation, free_choose_arg_map() will iterate over arg_map-\u003eargs and\ndereference a NULL pointer.\n\nTo prevent this potential NULL pointer dereference and make\nfree_choose_arg_map() more resilient, add checks for pointers before\niterating.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22991",
"url": "https://www.suse.com/security/cve/CVE-2026-22991"
},
{
"category": "external",
"summary": "SUSE Bug 1257220 for CVE-2026-22991",
"url": "https://bugzilla.suse.com/1257220"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22991"
},
{
"cve": "CVE-2026-22992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22992"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: return the handler error from mon_handle_auth_done()\n\nCurrently any error from ceph_auth_handle_reply_done() is propagated\nvia finish_auth() but isn\u0027t returned from mon_handle_auth_done(). This\nresults in higher layers learning that (despite the monitor considering\nus to be successfully authenticated) something went wrong in the\nauthentication phase and reacting accordingly, but msgr2 still trying\nto proceed with establishing the session in the background. In the\ncase of secure mode this can trigger a WARN in setup_crypto() and later\nlead to a NULL pointer dereference inside of prepare_auth_signature().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22992",
"url": "https://www.suse.com/security/cve/CVE-2026-22992"
},
{
"category": "external",
"summary": "SUSE Bug 1257218 for CVE-2026-22992",
"url": "https://bugzilla.suse.com/1257218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22992"
},
{
"cve": "CVE-2026-22993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22993"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: Fix RSS LUT NULL ptr issue after soft reset\n\nDuring soft reset, the RSS LUT is freed and not restored unless the\ninterface is up. If an ethtool command that accesses the rss lut is\nattempted immediately after reset, it will result in NULL ptr\ndereference. Also, there is no need to reset the rss lut if the soft reset\ndoes not involve queue count change.\n\nAfter soft reset, set the RSS LUT to default values based on the updated\nqueue count only if the reset was a result of a queue count change and\nthe LUT was not configured by the user. In all other cases, don\u0027t touch\nthe LUT.\n\nSteps to reproduce:\n\n** Bring the interface down (if up)\nifconfig eth1 down\n\n** update the queue count (eg., 27-\u003e20)\nethtool -L eth1 combined 20\n\n** display the RSS LUT\nethtool -x eth1\n\n[82375.558338] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[82375.558373] #PF: supervisor read access in kernel mode\n[82375.558391] #PF: error_code(0x0000) - not-present page\n[82375.558408] PGD 0 P4D 0\n[82375.558421] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003csnip\u003e\n[82375.558516] RIP: 0010:idpf_get_rxfh+0x108/0x150 [idpf]\n[82375.558786] Call Trace:\n[82375.558793] \u003cTASK\u003e\n[82375.558804] rss_prepare.isra.0+0x187/0x2a0\n[82375.558827] rss_prepare_data+0x3a/0x50\n[82375.558845] ethnl_default_doit+0x13d/0x3e0\n[82375.558863] genl_family_rcv_msg_doit+0x11f/0x180\n[82375.558886] genl_rcv_msg+0x1ad/0x2b0\n[82375.558902] ? __pfx_ethnl_default_doit+0x10/0x10\n[82375.558920] ? __pfx_genl_rcv_msg+0x10/0x10\n[82375.558937] netlink_rcv_skb+0x58/0x100\n[82375.558957] genl_rcv+0x2c/0x50\n[82375.558971] netlink_unicast+0x289/0x3e0\n[82375.558988] netlink_sendmsg+0x215/0x440\n[82375.559005] __sys_sendto+0x234/0x240\n[82375.559555] __x64_sys_sendto+0x28/0x30\n[82375.560068] x64_sys_call+0x1909/0x1da0\n[82375.560576] do_syscall_64+0x7a/0xfa0\n[82375.561076] ? clear_bhb_loop+0x60/0xb0\n[82375.561567] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22993",
"url": "https://www.suse.com/security/cve/CVE-2026-22993"
},
{
"category": "external",
"summary": "SUSE Bug 1257180 for CVE-2026-22993",
"url": "https://bugzilla.suse.com/1257180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22993"
},
{
"cve": "CVE-2026-22996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Don\u0027t store mlx5e_priv in mlx5e_dev devlink priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails, mlx5e_priv in mlx5e_dev devlink private is used to\nreference the netdev and mdev associated with that struct. Instead,\nstore netdev directly into mlx5e_dev and get mdev from the containing\nmlx5_adev aux device structure.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000520\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 3 UID: 0 PID: 521 Comm: devlink Not tainted 6.18.0-rc5+ #117 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_remove+0x68/0x130\nRSP: 0018:ffffc900034838f0 EFLAGS: 00010246\nRAX: ffff88810283c380 RBX: ffff888101874400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffff888102d789c0 R08: ffff8881007137f0 R09: ffff888100264e10\nR10: ffffc90003483898 R11: ffffc900034838a0 R12: ffff888100d261a0\nR13: ffff888100d261a0 R14: ffff8881018749a0 R15: ffff888101874400\nFS: 00007f8565fea740(0000) GS:ffff88856a759000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000520 CR3: 000000010b11a004 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22996",
"url": "https://www.suse.com/security/cve/CVE-2026-22996"
},
{
"category": "external",
"summary": "SUSE Bug 1257203 for CVE-2026-22996",
"url": "https://bugzilla.suse.com/1257203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22996"
},
{
"cve": "CVE-2026-22997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts\n\nSince j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is\ncalled only when the timer is enabled, we need to call\nj1939_session_deactivate_activate_next() if we cancelled the timer.\nOtherwise, refcount for j1939_session leaks, which will later appear as\n\n| unregister_netdevice: waiting for vcan0 to become free. Usage count = 2.\n\nproblem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22997",
"url": "https://www.suse.com/security/cve/CVE-2026-22997"
},
{
"category": "external",
"summary": "SUSE Bug 1257202 for CVE-2026-22997",
"url": "https://bugzilla.suse.com/1257202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-22997"
},
{
"cve": "CVE-2026-22999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: do not free existing class in qfq_change_class()\n\nFixes qfq_change_class() error case.\n\ncl-\u003eqdisc and cl should only be freed if a new class and qdisc\nwere allocated, or we risk various UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22999",
"url": "https://www.suse.com/security/cve/CVE-2026-22999"
},
{
"category": "external",
"summary": "SUSE Bug 1257236 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "external",
"summary": "SUSE Bug 1257238 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2026-22999"
},
{
"cve": "CVE-2026-23000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23000"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix crash on profile change rollback failure\n\nmlx5e_netdev_change_profile can fail to attach a new profile and can\nfail to rollback to old profile, in such case, we could end up with a\ndangling netdev with a fully reset netdev_priv. A retry to change\nprofile, e.g. another attempt to call mlx5e_netdev_change_profile via\nswitchdev mode change, will crash trying to access the now NULL\npriv-\u003emdev.\n\nThis fix allows mlx5e_netdev_change_profile() to handle previous\nfailures and an empty priv, by not assuming priv is valid.\n\nPass netdev and mdev to all flows requiring\nmlx5e_netdev_change_profile() and avoid passing priv.\nIn mlx5e_netdev_change_profile() check if current priv is valid, and if\nnot, just attach the new profile without trying to access the old one.\n\nThis fixes the following oops, when enabling switchdev mode for the 2nd\ntime after first time failure:\n\n ## Enabling switchdev mode first time:\n\nmlx5_core 0012:03:00.1: E-Switch: Supported tc chains and prios offload\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n ^^^^^^^^\nmlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\n\n ## retry: Enabling switchdev mode 2nd time:\n\nmlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload\nBUG: kernel NULL pointer dereference, address: 0000000000000038\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 13 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc4+ #91 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_detach_netdev+0x3c/0x90\nCode: 50 00 00 f0 80 4f 78 02 48 8b bf e8 07 00 00 48 85 ff 74 16 48 8b 73 78 48 d1 ee 83 e6 01 83 f6 01 40 0f b6 f6 e8 c4 42 00 00 \u003c48\u003e 8b 45 38 48 85 c0 74 08 48 89 df e8 cc 47 40 1e 48 8b bb f0 07\nRSP: 0018:ffffc90000673890 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff8881036a89c0 RCX: 0000000000000000\nRDX: ffff888113f63800 RSI: ffffffff822fe720 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000002dcd R09: 0000000000000000\nR10: ffffc900006738e8 R11: 00000000ffffffff R12: 0000000000000000\nR13: 0000000000000000 R14: ffff8881036a89c0 R15: 0000000000000000\nFS: 00007fdfb8384740(0000) GS:ffff88856a9d6000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000038 CR3: 0000000112ae0005 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_netdev_change_profile+0x45/0xb0\n mlx5e_vport_rep_load+0x27b/0x2d0\n mlx5_esw_offloads_rep_load+0x72/0xf0\n esw_offloads_enable+0x5d0/0x970\n mlx5_eswitch_enable_locked+0x349/0x430\n ? is_mp_supported+0x57/0xb0\n mlx5_devlink_eswitch_mode_set+0x26b/0x430\n devlink_nl_eswitch_set_doit+0x6f/0xf0\n genl_family_rcv_msg_doit+0xe8/0x140\n genl_rcv_msg+0x18b/0x290\n ? __pfx_devlink_nl_pre_doit+0x10/0x10\n ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10\n ? __pfx_devlink_nl_post_doit+0x10/0x10\n ? __pfx_genl_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x52/0x100\n genl_rcv+0x28/0x40\n netlink_unicast+0x282/0x3e0\n ? __alloc_skb+0xd6/0x190\n netlink_sendmsg+0x1f7/0x430\n __sys_sendto+0x213/0x220\n ? __sys_recvmsg+0x6a/0xd0\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x50/0x1f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7fdfb8495047",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23000",
"url": "https://www.suse.com/security/cve/CVE-2026-23000"
},
{
"category": "external",
"summary": "SUSE Bug 1257234 for CVE-2026-23000",
"url": "https://bugzilla.suse.com/1257234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-23000"
},
{
"cve": "CVE-2026-23001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix possible UAF in macvlan_forward_source()\n\nAdd RCU protection on (struct macvlan_source_entry)-\u003evlan.\n\nWhenever macvlan_hash_del_source() is called, we must clear\nentry-\u003evlan pointer before RCU grace period starts.\n\nThis allows macvlan_forward_source() to skip over\nentries queued for freeing.\n\nNote that macvlan_dev are already RCU protected, as they\nare embedded in a standard netdev (netdev_priv(ndev)).\n\nhttps: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23001",
"url": "https://www.suse.com/security/cve/CVE-2026-23001"
},
{
"category": "external",
"summary": "SUSE Bug 1257232 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "external",
"summary": "SUSE Bug 1257233 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "important"
}
],
"title": "CVE-2026-23001"
},
{
"cve": "CVE-2026-23005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23005"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1\n\nWhen loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in\nresponse to a guest WRMSR, clear XFD-disabled features in the saved (or to\nbe restored) XSTATE_BV to ensure KVM doesn\u0027t attempt to load state for\nfeatures that are disabled via the guest\u0027s XFD. Because the kernel\nexecutes XRSTOR with the guest\u0027s XFD, saving XSTATE_BV[i]=1 with XFD[i]=1\nwill cause XRSTOR to #NM and panic the kernel.\n\nE.g. if fpu_update_guest_xfd() sets XFD without clearing XSTATE_BV:\n\n ------------[ cut here ]------------\n WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#29: amx_test/848\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 29 UID: 1000 PID: 848 Comm: amx_test Not tainted 6.19.0-rc2-ffa07f7fd437-x86_amx_nm_xfd_non_init-vm #171 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:exc_device_not_available+0x101/0x110\n Call Trace:\n \u003cTASK\u003e\n asm_exc_device_not_available+0x1a/0x20\n RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90\n switch_fpu_return+0x4a/0xb0\n kvm_arch_vcpu_ioctl_run+0x1245/0x1e40 [kvm]\n kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]\n __x64_sys_ioctl+0x8f/0xd0\n do_syscall_64+0x62/0x940\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nThis can happen if the guest executes WRMSR(MSR_IA32_XFD) to set XFD[18] = 1,\nand a host IRQ triggers kernel_fpu_begin() prior to the vmexit handler\u0027s\ncall to fpu_update_guest_xfd().\n\nand if userspace stuffs XSTATE_BV[i]=1 via KVM_SET_XSAVE:\n\n ------------[ cut here ]------------\n WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#14: amx_test/867\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 14 UID: 1000 PID: 867 Comm: amx_test Not tainted 6.19.0-rc2-2dace9faccd6-x86_amx_nm_xfd_non_init-vm #168 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:exc_device_not_available+0x101/0x110\n Call Trace:\n \u003cTASK\u003e\n asm_exc_device_not_available+0x1a/0x20\n RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90\n fpu_swap_kvm_fpstate+0x6b/0x120\n kvm_load_guest_fpu+0x30/0x80 [kvm]\n kvm_arch_vcpu_ioctl_run+0x85/0x1e40 [kvm]\n kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]\n __x64_sys_ioctl+0x8f/0xd0\n do_syscall_64+0x62/0x940\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nThe new behavior is consistent with the AMX architecture. Per Intel\u0027s SDM,\nXSAVE saves XSTATE_BV as \u00270\u0027 for components that are disabled via XFD\n(and non-compacted XSAVE saves the initial configuration of the state\ncomponent):\n\n If XSAVE, XSAVEC, XSAVEOPT, or XSAVES is saving the state component i,\n the instruction does not generate #NM when XCR0[i] = IA32_XFD[i] = 1;\n instead, it operates as if XINUSE[i] = 0 (and the state component was\n in its initial state): it saves bit i of XSTATE_BV field of the XSAVE\n header as 0; in addition, XSAVE saves the initial configuration of the\n state component (the other instructions do not save state component i).\n\nAlternatively, KVM could always do XRSTOR with XFD=0, e.g. by using\na constant XFD based on the set of enabled features when XSAVEing for\na struct fpu_guest. However, having XSTATE_BV[i]=1 for XFD-disabled\nfeatures can only happen in the above interrupt case, or in similar\nscenarios involving preemption on preemptible kernels, because\nfpu_swap_kvm_fpstate()\u0027s call to save_fpregs_to_fpstate() saves the\noutgoing FPU state with the current XFD; and that is (on all but the\nfirst WRMSR to XFD) the guest XFD.\n\nTherefore, XFD can only go out of sync with XSTATE_BV in the above\ninterrupt case, or in similar scenarios involving preemption on\npreemptible kernels, and it we can consider it (de facto) part of KVM\nABI that KVM_GET_XSAVE returns XSTATE_BV[i]=0 for XFD-disabled features.\n\n[Move clea\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23005",
"url": "https://www.suse.com/security/cve/CVE-2026-23005"
},
{
"category": "external",
"summary": "SUSE Bug 1257245 for CVE-2026-23005",
"url": "https://bugzilla.suse.com/1257245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-23005"
},
{
"cve": "CVE-2026-23006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: tlv320adcx140: fix null pointer\n\nThe \"snd_soc_component\" in \"adcx140_priv\" was only used once but never\nset. It was only used for reaching \"dev\" which is already present in\n\"adcx140_priv\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23006",
"url": "https://www.suse.com/security/cve/CVE-2026-23006"
},
{
"category": "external",
"summary": "SUSE Bug 1257208 for CVE-2026-23006",
"url": "https://bugzilla.suse.com/1257208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-23006"
},
{
"cve": "CVE-2026-23011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_gre: make ipgre_header() robust\n\nAnalog to commit db5b4e39c4e6 (\"ip6_gre: make ip6gre_header() robust\")\n\nOver the years, syzbot found many ways to crash the kernel\nin ipgre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ipgre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0\n kernel BUG at net/core/skbuff.c:213 !\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: mld mld_ifc_work\n RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213\nCall Trace:\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23011",
"url": "https://www.suse.com/security/cve/CVE-2026-23011"
},
{
"category": "external",
"summary": "SUSE Bug 1257207 for CVE-2026-23011",
"url": "https://bugzilla.suse.com/1257207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.31.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.31.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-11T14:05:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-23011"
}
]
}
SUSE-SU-2026:0587-1
Vulnerability from csaf_suse - Published: 2026-02-20 10:04 - Updated: 2026-02-20 10:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-54013: interconnect: Fix locking for runpm vs reclaim (bsc#1256280).\n- CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info (bsc#1250388).\n- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).\n- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).\n- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).\n- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).\n- CVE-2025-40261: nvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).\n- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).\n- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).\n- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).\n- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).\n- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).\n- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).\n- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).\n- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).\n- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).\n- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).\n- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).\n- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).\n- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).\n- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).\n- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).\n- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).\n- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).\n- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).\n- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).\n- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).\n- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).\n- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).\n- CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind (bsc#1255488).\n- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).\n- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).\n- CVE-2025-68363: bpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu (bsc#1255552).\n- CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use (bsc#1255548).\n- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).\n- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).\n- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).\n- CVE-2025-68379: RDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure (bsc#1255695).\n- CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname() (bsc#1255568).\n- CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in mi_format_new (bsc#1255539).\n- CVE-2025-68733: smack: fix bug: unprivileged task can create labels (bsc#1255615).\n- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).\n- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).\n- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).\n- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).\n- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).\n- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).\n- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).\n- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).\n- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).\n- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).\n- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).\n- CVE-2025-68803: nfsd: set security label during create operations (bsc#1256770).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).\n- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).\n- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).\n- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).\n- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n (bsc#1256645).\n- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).\n- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).\n- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).\n- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).\n- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).\n- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).\n- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).\n- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).\n- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).\n- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).\n- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).\n- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).\n- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).\n- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).\n- CVE-2025-71137: octeontx2-pf: fix \u0027UBSAN: shift-out-of-bounds error\u0027 (bsc#1256760).\n- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).\n- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).\n- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).\n- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).\n- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).\n- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).\n- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).\n- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).\n- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).\n- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).\n- CVE-2026-22996: net/mlx5e: Don\u0027t store mlx5e_priv in mlx5e_dev devlink priv.\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).\n- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).\n- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).\n- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).\n\nThe following non security issues were fixed:\n\n- ALSA: ctxfi: Fix potential OOB access in audio mixer handling (stable-fixes).\n- ALSA: scarlett2: Fix buffer overflow in config retrieval (git-fixes).\n- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).\n- ALSA: usb: Increase volume range that triggers a warning (git-fixes).\n- ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion (git-fixes).\n- ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 (stable-fixes).\n- ASoC: codecs: wsa881x: Drop unused version readout (stable-fixes).\n- ASoC: codecs: wsa881x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa883x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa884x: fix codec initialisation (git-fixes).\n- ASoC: fsl: imx-card: Do not force slot width to sample width (git-fixes).\n- ASoC: fsl_sai: Add missing registers to cache default (stable-fixes).\n- ASoC: tlv320adcx140: fix null pointer (git-fixes).\n- ASoC: tlv320adcx140: fix word length (git-fixes).\n- Bluetooth: MGMT: Fix memory leak in set_ssp_complete (git-fixes).\n- Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work (git-fixes).\n- HID: usbhid: paper over wrong bNumDescriptor field (stable-fixes).\n- Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA (stable-fixes).\n- Input: i8042 - add quirks for MECHREVO Wujie 15X Pro (stable-fixes).\n- NFS: Fix up the automount fs_context to use the correct cred (git-fixes).\n- NFSD/blocklayout: Fix minlength check in proc_layoutget (git-fixes).\n- NFSD: Fix permission check for read access to executable-only files (git-fixes).\n- NFSD: use correct reservation type in nfsd4_scsi_fence_client (git-fixes).\n- NFSv4: ensure the open stateid seqid doesn\u0027t go backwards (git-fixes).\n- RDMA/mana_ib: Access remote atomic for MRs (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (git-fixes).\n- RDMA/mana_ib: add additional port counters (git-fixes).\n- RDMA/mana_ib: add support of multiple ports (git-fixes).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (git-fixes).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- Revert \u0027nfc/nci: Add the inconsistency check between the input data length and count\u0027 (git-fixes).\n- USB: OHCI/UHCI: Add soft dependencies on ehci_platform (stable-fixes).\n- USB: serial: ftdi_sio: add support for PICAXE AXE027 cable (stable-fixes).\n- USB: serial: option: add Telit LE910 MBIM composition (stable-fixes).\n- ata: libata: Add cpr_log to ata_dev_print_features() early return (git-fixes).\n- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).\n- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).\n- bs-upload-kernel: Fix cve branch uploads.\n- btrfs: do not strictly require dirty metadata threshold for metadata writepages (stable-fixes).\n- can: ctucanfd: fix SSP_SRC in cases when bit-rate is higher than 1 MBit (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: etas_es58x: allow partial RX URB allocation to succeed (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): fix error message (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error (git-fixes).\n- can: j1939: make j1939_session_activate() fail if device is no longer registered (stable-fixes).\n- can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak (git-fixes).\n- cifs: Fix copy offload to flush destination region (bsc#1252511).\n- cifs: Fix flushing, invalidation and file size with copy_file_range() (bsc#1252511).\n- cifs: add new field to track the last access time of cfid (git-fixes).\n- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).\n- cifs: avoid redundant calls to disable multichannel (git-fixes).\n- cifs: cifs_pick_channel should try selecting active channels (git-fixes).\n- cifs: deal with the channel loading lag while picking channels (git-fixes).\n- cifs: dns resolution is needed only for primary channel (git-fixes).\n- cifs: do not disable interface polling on failure (git-fixes).\n- cifs: do not search for channel if server is terminating (git-fixes).\n- cifs: fix a pending undercount of srv_count (git-fixes).\n- cifs: fix lock ordering while disabling multichannel (git-fixes).\n- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).\n- cifs: fix use after free for iface while disabling secondary channels (git-fixes).\n- cifs: handle servers that still advertise multichannel after disabling (git-fixes).\n- cifs: handle when server starts supporting multichannel (git-fixes).\n- cifs: handle when server stops supporting multichannel (git-fixes).\n- cifs: make cifs_chan_update_iface() a void function (git-fixes).\n- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).\n- cifs: make sure that channel scaling is done only once (git-fixes).\n- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).\n- cifs: reset connections for all channels when reconnect requested (git-fixes).\n- cifs: reset iface weights when we cannot find a candidate (git-fixes).\n- cifs: serialize other channels when query server interfaces is pending (git-fixes).\n- cifs: update dstaddr whenever channel iface is updated (git-fixes).\n- comedi: Fix getting range information for subdevices 16 to 255 (git-fixes).\n- comedi: dmm32at: serialize use of paged registers (git-fixes).\n- comedi: fix divide-by-zero in comedi_buf_munge() (stable-fixes).\n- cpuset: fix warning when disabling remote partition (bsc#1256794).\n- crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (git-fixes).\n- dmaengine: apple-admac: Add \u0027apple,t8103-admac\u0027 compatible (git-fixes).\n- dmaengine: at_hdmac: fix device leak on of_dma_xlate() (git-fixes).\n- dmaengine: bcm-sba-raid: fix device leak on probe (git-fixes).\n- dmaengine: dw: dmamux: fix OF node leak on route allocation failure (git-fixes).\n- dmaengine: idxd: fix device leaks on compat bind and unbind (git-fixes).\n- dmaengine: lpc18xx-dmamux: fix device leak on route allocation (git-fixes).\n- dmaengine: omap-dma: fix dma_pool resource leak in error paths (git-fixes).\n- dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() (git-fixes).\n- dmaengine: sh: rz-dmac: Fix rz_dmac_terminate_all() (git-fixes).\n- dmaengine: tegra-adma: Fix use-after-free (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on dra7x route allocation (git-fixes).\n- dmaengine: ti: k3-udma: fix device leak on udma lookup (git-fixes).\n- dmaengine: xilinx: xdma: Fix regmap max_register (git-fixes).\n- dmaengine: xilinx_dma: Fix uninitialized addr_width when \u0027xlnx,addrwidth\u0027 property is missing (git-fixes).\n- dpll: Prevent duplicate registrations (git-fixes).\n- dpll: fix device-id-get and pin-id-get to return errors properly (git-fixes).\n- dpll: fix return value check for kmemdup (git-fixes).\n- dpll: indent DPLL option type by a tab (git-fixes).\n- dpll: spec: add missing module-name and clock-id to pin-get reply (git-fixes).\n- drm/amd/display: Apply e4479aecf658 to dml (stable-fixes).\n- drm/amd/display: Bump the HDMI clock to 340MHz (stable-fixes).\n- drm/amd/display: Fix DP no audio issue (stable-fixes).\n- drm/amd/display: Initialise backlight level values from hw (git-fixes).\n- drm/amd/display: Respect user\u0027s CONFIG_FRAME_WARN more for dml files (stable-fixes).\n- drm/amd/display: shrink struct members (stable-fixes).\n- drm/amd/pm: Don\u0027t clear SI SMC table when setting power limit (git-fixes).\n- drm/amd/pm: Workaround SI powertune issue on Radeon 430 (v2) (git-fixes).\n- drm/amd/pm: fix race in power state check before mutex lock (git-fixes).\n- drm/amd/pm: fix smu overdrive data type wrong issue on smu 14.0.2 (git-fixes).\n- drm/amd: Clean up kfd node on surprise disconnect (stable-fixes).\n- drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule() (git-fixes).\n- drm/amdgpu: Fix query for VPE block_type and ip_count (stable-fixes).\n- drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove (git-fixes).\n- drm/amdgpu: remove frame cntl for gfx v12 (stable-fixes).\n- drm/amdkfd: Fix improper NULL termination of queue restore SMI event string (stable-fixes).\n- drm/amdkfd: fix a memory leak in device_queue_manager_init() (git-fixes).\n- drm/imagination: Wait for FW trace update command completion (git-fixes).\n- drm/imx/tve: fix probe device leak (git-fixes).\n- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).\n- drm/nouveau/disp/nv50-: Set lock_core in curs507a_prepare (git-fixes).\n- drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit) (stable-fixes).\n- drm/nouveau: add missing DCB connector types (git-fixes).\n- drm/nouveau: implement missing DCB connector types; gracefully handle unknown connectors (git-fixes).\n- drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel (git-fixes).\n- drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] (stable-fixes).\n- drm/vmwgfx: Fix an error return check in vmw_compat_shader_add() (git-fixes).\n- drm/vmwgfx: Merge vmw_bo_release and vmw_bo_free functions (git-fixes).\n- exfat: check return value of sb_min_blocksize in exfat_read_boot_sector (git-fixes).\n- exfat: fix remount failure in different process environments (git-fixes).\n- gpio: omap: do not register driver in probe() (git-fixes).\n- gpio: pca953x: Add support for level-triggered interrupts (stable-fixes).\n- gpio: pca953x: Utilise dev_err_probe() where it makes sense (stable-fixes).\n- gpio: pca953x: Utilise temporary variable for struct device (stable-fixes).\n- gpio: pca953x: fix wrong error probe return value (git-fixes).\n- gpio: pca953x: handle short interrupt pulses on PCAL devices (git-fixes).\n- gpio: rockchip: Stop calling pinctrl for set_direction (git-fixes).\n- ice: use netif_get_num_default_rss_queues() (bsc#1247712).\n- iio: accel: iis328dq: fix gain values (git-fixes).\n- iio: adc: ad7280a: handle spi_setup() errors in probe() (git-fixes).\n- iio: adc: ad9467: fix ad9434 vref mask (git-fixes).\n- iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver (git-fixes).\n- iio: dac: ad5686: add AD5695R to ad5686_chip_info_tbl (git-fixes).\n- iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection (git-fixes).\n- intel_th: fix device leak on output open() (git-fixes).\n- leds: led-class: Only Add LED to leds_list when it is fully ready (git-fixes).\n- lib/crypto: aes: Fix missing MMU protection for AES S-box (git-fixes).\n- mISDN: annotate data-race around dev-\u003ework (git-fixes).\n- mei: me: add nova lake point S DID (stable-fixes).\n- mei: me: add wildcat lake P DID (stable-fixes).\n- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1253087 bsc#1254447).\n- mmc: rtsx_pci_sdmmc: implement sdmmc_card_busy function (git-fixes).\n- mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode (git-fixes).\n- net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts (git-fixes).\n- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (git-fixes).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (git-fixes).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (git-fixes).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: tcp: allow zero-window ACK update the window (bsc#1254767).\n- net: usb: dm9601: remove broken SR9700 support (git-fixes).\n- net: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path (git-fixes).\n- nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame() (git-fixes).\n- nfc: nci: Fix race between rfkill and nci_unregister_device() (git-fixes).\n- nfsd: Drop the client reference in client_states_open() (git-fixes).\n- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).\n- nvmet-auth: update sc_c in host response (git-fixes).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- of: fix reference count leak in of_alias_scan() (git-fixes).\n- of: platform: Use default match table for /firmware (git-fixes).\n- phy: freescale: imx8m-pcie: assert phy reset during power on (stable-fixes).\n- phy: rockchip: inno-usb2: fix communication disruption in gadget mode (git-fixes).\n- phy: rockchip: inno-usb2: fix disconnection in gadget mode (git-fixes).\n- phy: stm32-usphyc: Fix off by one in probe() (git-fixes).\n- phy: tegra: xusb: Explicitly configure HS_DISCON_LEVEL to 0x7 (git-fixes).\n- platform/x86/amd: Fix memory leak in wbrf_record() (git-fixes).\n- platform/x86: hp-bioscfg: Fix automatic module loading (git-fixes).\n- platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro (git-fixes).\n- platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names (git-fixes).\n- pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() (git-fixes).\n- powercap: fix race condition in register_control_type() (stable-fixes).\n- powercap: fix sscanf() error return value handling (stable-fixes).\n- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).\n- regmap: Fix race condition in hwspinlock irqsave routine (git-fixes).\n- sched/rt: Skip group schedulable check with rt_group_sched=0 (bsc#1256568).\n- sched: Increase sched_tick_remote timeout (bsc#1254510).\n- scripts/python/git_sort/git_sort.yaml: add cifs for-next repository.\n- scripts: obsapi: Support URL trailing / in oscrc.\n- scripts: teaapi: Add paging.\n- scripts: uploader: Fix no change condition for _maintainership.json.\n- scripts: uploader: Handle missing upstream in is_pr_open.\n- scrits: teaapi: Add list_repos.\n- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256861).\n- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256861).\n- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256863).\n- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256863).\n- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256863).\n- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256863).\n- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256863).\n- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256863).\n- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256863).\n- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256863).\n- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256863).\n- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256863).\n- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256863).\n- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256863).\n- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).\n- selftests/bpf: Fix flaky bpf_cookie selftest (git-fixes).\n- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).\n- serial: 8250_pci: Fix broken RS485 for F81504/508/512 (git-fixes).\n- slimbus: core: fix OF node leak on registration failure (git-fixes).\n- slimbus: core: fix device reference leak on report present (git-fixes).\n- slimbus: core: fix of_slim_get_device() kernel doc (git-fixes).\n- slimbus: core: fix runtime PM imbalance on report present (git-fixes).\n- smb3: add missing null server pointer check (git-fixes).\n- smb: change return type of cached_dir_lease_break() to bool (git-fixes).\n- smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid (git-fixes).\n- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).\n- smb: client: fix warning when reconnecting channel (git-fixes).\n- smb: client: introduce close_cached_dir_locked() (git-fixes).\n- smb: client: remove unused fid_lock (git-fixes).\n- smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-fixes).\n- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748 bsc#1257154).\n- smb: client: update cfid-\u003elast_access_time in open_cached_dir_by_dentry() (git-fixes).\n- smb: improve directory cache reuse for readdir operations (bsc#1252712).\n- spi: spi-sprd-adi: Fix double free in probe error path (git-fixes).\n- spi: sprd-adi: switch to use spi_alloc_host() (stable-fixes).\n- spi: sprd: adi: Use devm_register_restart_handler() (stable-fixes).\n- svcrdma: return 0 on success from svc_rdma_copy_inline_range (git-fixes).\n- uacce: ensure safe queue release with state management (git-fixes).\n- uacce: fix cdev handling in the cleanup path (git-fixes).\n- uacce: fix isolate sysfs check condition (git-fixes).\n- uacce: implement mremap in uacce_vm_ops to return -EPERM (git-fixes).\n- usb: core: add USB_QUIRK_NO_BOS for devices that hang on BOS descriptor (stable-fixes).\n- usb: dwc3: Check for USB4 IP_NAME (stable-fixes).\n- usbnet: limit max_mtu based on device\u0027s hard_mtu (git-fixes).\n- w1: fix redundant counter decrement in w1_attach_slave_device() (git-fixes).\n- w1: therm: Fix off-by-one buffer overflow in alarms_store (git-fixes).\n- wifi: ath10k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: ath12k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: mac80211: correctly decode TTLM with default link map (git-fixes).\n- wifi: mac80211: don\u0027t perform DA check on S1G beacon (git-fixes).\n- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).\n- wifi: rsi: Fix memory corruption due to not set vif driver data size (git-fixes).\n- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).\n- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).\n- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).\n- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).\n- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).\n- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches\n (bsc#1256528).\n- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).\n- x86/microcode/AMD: Fix __apply_microcode_amd()\u0027s return value (bsc#1256528).\n- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).\n- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).\n- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).\n- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).\n- x86: make page fault handling disable interrupts properly (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-587,SUSE-SLE-Module-Live-Patching-15-SP7-2026-587,SUSE-SLE-Module-RT-15-SP7-2026-587",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0587-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0587-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260587-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0587-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205462",
"url": "https://bugzilla.suse.com/1205462"
},
{
"category": "self",
"summary": "SUSE Bug 1214285",
"url": "https://bugzilla.suse.com/1214285"
},
{
"category": "self",
"summary": "SUSE Bug 1215199",
"url": "https://bugzilla.suse.com/1215199"
},
{
"category": "self",
"summary": "SUSE Bug 1223800",
"url": "https://bugzilla.suse.com/1223800"
},
{
"category": "self",
"summary": "SUSE Bug 1228490",
"url": "https://bugzilla.suse.com/1228490"
},
{
"category": "self",
"summary": "SUSE Bug 1233563",
"url": "https://bugzilla.suse.com/1233563"
},
{
"category": "self",
"summary": "SUSE Bug 1234842",
"url": "https://bugzilla.suse.com/1234842"
},
{
"category": "self",
"summary": "SUSE Bug 1235566",
"url": "https://bugzilla.suse.com/1235566"
},
{
"category": "self",
"summary": "SUSE Bug 1241437",
"url": "https://bugzilla.suse.com/1241437"
},
{
"category": "self",
"summary": "SUSE Bug 1242505",
"url": "https://bugzilla.suse.com/1242505"
},
{
"category": "self",
"summary": "SUSE Bug 1242909",
"url": "https://bugzilla.suse.com/1242909"
},
{
"category": "self",
"summary": "SUSE Bug 1243662",
"url": "https://bugzilla.suse.com/1243662"
},
{
"category": "self",
"summary": "SUSE Bug 1243677",
"url": "https://bugzilla.suse.com/1243677"
},
{
"category": "self",
"summary": "SUSE Bug 1243678",
"url": "https://bugzilla.suse.com/1243678"
},
{
"category": "self",
"summary": "SUSE Bug 1245538",
"url": "https://bugzilla.suse.com/1245538"
},
{
"category": "self",
"summary": "SUSE Bug 1246022",
"url": "https://bugzilla.suse.com/1246022"
},
{
"category": "self",
"summary": "SUSE Bug 1246184",
"url": "https://bugzilla.suse.com/1246184"
},
{
"category": "self",
"summary": "SUSE Bug 1246447",
"url": "https://bugzilla.suse.com/1246447"
},
{
"category": "self",
"summary": "SUSE Bug 1247030",
"url": "https://bugzilla.suse.com/1247030"
},
{
"category": "self",
"summary": "SUSE Bug 1247712",
"url": "https://bugzilla.suse.com/1247712"
},
{
"category": "self",
"summary": "SUSE Bug 1248211",
"url": "https://bugzilla.suse.com/1248211"
},
{
"category": "self",
"summary": "SUSE Bug 1249307",
"url": "https://bugzilla.suse.com/1249307"
},
{
"category": "self",
"summary": "SUSE Bug 1249904",
"url": "https://bugzilla.suse.com/1249904"
},
{
"category": "self",
"summary": "SUSE Bug 1250032",
"url": "https://bugzilla.suse.com/1250032"
},
{
"category": "self",
"summary": "SUSE Bug 1250082",
"url": "https://bugzilla.suse.com/1250082"
},
{
"category": "self",
"summary": "SUSE Bug 1250388",
"url": "https://bugzilla.suse.com/1250388"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250748",
"url": "https://bugzilla.suse.com/1250748"
},
{
"category": "self",
"summary": "SUSE Bug 1252511",
"url": "https://bugzilla.suse.com/1252511"
},
{
"category": "self",
"summary": "SUSE Bug 1252712",
"url": "https://bugzilla.suse.com/1252712"
},
{
"category": "self",
"summary": "SUSE Bug 1252891",
"url": "https://bugzilla.suse.com/1252891"
},
{
"category": "self",
"summary": "SUSE Bug 1252900",
"url": "https://bugzilla.suse.com/1252900"
},
{
"category": "self",
"summary": "SUSE Bug 1253087",
"url": "https://bugzilla.suse.com/1253087"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253340",
"url": "https://bugzilla.suse.com/1253340"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253471",
"url": "https://bugzilla.suse.com/1253471"
},
{
"category": "self",
"summary": "SUSE Bug 1253739",
"url": "https://bugzilla.suse.com/1253739"
},
{
"category": "self",
"summary": "SUSE Bug 1254244",
"url": "https://bugzilla.suse.com/1254244"
},
{
"category": "self",
"summary": "SUSE Bug 1254447",
"url": "https://bugzilla.suse.com/1254447"
},
{
"category": "self",
"summary": "SUSE Bug 1254465",
"url": "https://bugzilla.suse.com/1254465"
},
{
"category": "self",
"summary": "SUSE Bug 1254510",
"url": "https://bugzilla.suse.com/1254510"
},
{
"category": "self",
"summary": "SUSE Bug 1254624",
"url": "https://bugzilla.suse.com/1254624"
},
{
"category": "self",
"summary": "SUSE Bug 1254767",
"url": "https://bugzilla.suse.com/1254767"
},
{
"category": "self",
"summary": "SUSE Bug 1254835",
"url": "https://bugzilla.suse.com/1254835"
},
{
"category": "self",
"summary": "SUSE Bug 1254839",
"url": "https://bugzilla.suse.com/1254839"
},
{
"category": "self",
"summary": "SUSE Bug 1254842",
"url": "https://bugzilla.suse.com/1254842"
},
{
"category": "self",
"summary": "SUSE Bug 1254845",
"url": "https://bugzilla.suse.com/1254845"
},
{
"category": "self",
"summary": "SUSE Bug 1254852",
"url": "https://bugzilla.suse.com/1254852"
},
{
"category": "self",
"summary": "SUSE Bug 1254871",
"url": "https://bugzilla.suse.com/1254871"
},
{
"category": "self",
"summary": "SUSE Bug 1255102",
"url": "https://bugzilla.suse.com/1255102"
},
{
"category": "self",
"summary": "SUSE Bug 1255120",
"url": "https://bugzilla.suse.com/1255120"
},
{
"category": "self",
"summary": "SUSE Bug 1255128",
"url": "https://bugzilla.suse.com/1255128"
},
{
"category": "self",
"summary": "SUSE Bug 1255138",
"url": "https://bugzilla.suse.com/1255138"
},
{
"category": "self",
"summary": "SUSE Bug 1255140",
"url": "https://bugzilla.suse.com/1255140"
},
{
"category": "self",
"summary": "SUSE Bug 1255157",
"url": "https://bugzilla.suse.com/1255157"
},
{
"category": "self",
"summary": "SUSE Bug 1255164",
"url": "https://bugzilla.suse.com/1255164"
},
{
"category": "self",
"summary": "SUSE Bug 1255172",
"url": "https://bugzilla.suse.com/1255172"
},
{
"category": "self",
"summary": "SUSE Bug 1255216",
"url": "https://bugzilla.suse.com/1255216"
},
{
"category": "self",
"summary": "SUSE Bug 1255226",
"url": "https://bugzilla.suse.com/1255226"
},
{
"category": "self",
"summary": "SUSE Bug 1255241",
"url": "https://bugzilla.suse.com/1255241"
},
{
"category": "self",
"summary": "SUSE Bug 1255255",
"url": "https://bugzilla.suse.com/1255255"
},
{
"category": "self",
"summary": "SUSE Bug 1255260",
"url": "https://bugzilla.suse.com/1255260"
},
{
"category": "self",
"summary": "SUSE Bug 1255261",
"url": "https://bugzilla.suse.com/1255261"
},
{
"category": "self",
"summary": "SUSE Bug 1255266",
"url": "https://bugzilla.suse.com/1255266"
},
{
"category": "self",
"summary": "SUSE Bug 1255268",
"url": "https://bugzilla.suse.com/1255268"
},
{
"category": "self",
"summary": "SUSE Bug 1255269",
"url": "https://bugzilla.suse.com/1255269"
},
{
"category": "self",
"summary": "SUSE Bug 1255327",
"url": "https://bugzilla.suse.com/1255327"
},
{
"category": "self",
"summary": "SUSE Bug 1255346",
"url": "https://bugzilla.suse.com/1255346"
},
{
"category": "self",
"summary": "SUSE Bug 1255377",
"url": "https://bugzilla.suse.com/1255377"
},
{
"category": "self",
"summary": "SUSE Bug 1255401",
"url": "https://bugzilla.suse.com/1255401"
},
{
"category": "self",
"summary": "SUSE Bug 1255403",
"url": "https://bugzilla.suse.com/1255403"
},
{
"category": "self",
"summary": "SUSE Bug 1255417",
"url": "https://bugzilla.suse.com/1255417"
},
{
"category": "self",
"summary": "SUSE Bug 1255482",
"url": "https://bugzilla.suse.com/1255482"
},
{
"category": "self",
"summary": "SUSE Bug 1255488",
"url": "https://bugzilla.suse.com/1255488"
},
{
"category": "self",
"summary": "SUSE Bug 1255537",
"url": "https://bugzilla.suse.com/1255537"
},
{
"category": "self",
"summary": "SUSE Bug 1255539",
"url": "https://bugzilla.suse.com/1255539"
},
{
"category": "self",
"summary": "SUSE Bug 1255544",
"url": "https://bugzilla.suse.com/1255544"
},
{
"category": "self",
"summary": "SUSE Bug 1255547",
"url": "https://bugzilla.suse.com/1255547"
},
{
"category": "self",
"summary": "SUSE Bug 1255548",
"url": "https://bugzilla.suse.com/1255548"
},
{
"category": "self",
"summary": "SUSE Bug 1255552",
"url": "https://bugzilla.suse.com/1255552"
},
{
"category": "self",
"summary": "SUSE Bug 1255568",
"url": "https://bugzilla.suse.com/1255568"
},
{
"category": "self",
"summary": "SUSE Bug 1255569",
"url": "https://bugzilla.suse.com/1255569"
},
{
"category": "self",
"summary": "SUSE Bug 1255615",
"url": "https://bugzilla.suse.com/1255615"
},
{
"category": "self",
"summary": "SUSE Bug 1255622",
"url": "https://bugzilla.suse.com/1255622"
},
{
"category": "self",
"summary": "SUSE Bug 1255695",
"url": "https://bugzilla.suse.com/1255695"
},
{
"category": "self",
"summary": "SUSE Bug 1255930",
"url": "https://bugzilla.suse.com/1255930"
},
{
"category": "self",
"summary": "SUSE Bug 1256280",
"url": "https://bugzilla.suse.com/1256280"
},
{
"category": "self",
"summary": "SUSE Bug 1256528",
"url": "https://bugzilla.suse.com/1256528"
},
{
"category": "self",
"summary": "SUSE Bug 1256568",
"url": "https://bugzilla.suse.com/1256568"
},
{
"category": "self",
"summary": "SUSE Bug 1256579",
"url": "https://bugzilla.suse.com/1256579"
},
{
"category": "self",
"summary": "SUSE Bug 1256582",
"url": "https://bugzilla.suse.com/1256582"
},
{
"category": "self",
"summary": "SUSE Bug 1256584",
"url": "https://bugzilla.suse.com/1256584"
},
{
"category": "self",
"summary": "SUSE Bug 1256586",
"url": "https://bugzilla.suse.com/1256586"
},
{
"category": "self",
"summary": "SUSE Bug 1256591",
"url": "https://bugzilla.suse.com/1256591"
},
{
"category": "self",
"summary": "SUSE Bug 1256592",
"url": "https://bugzilla.suse.com/1256592"
},
{
"category": "self",
"summary": "SUSE Bug 1256593",
"url": "https://bugzilla.suse.com/1256593"
},
{
"category": "self",
"summary": "SUSE Bug 1256594",
"url": "https://bugzilla.suse.com/1256594"
},
{
"category": "self",
"summary": "SUSE Bug 1256597",
"url": "https://bugzilla.suse.com/1256597"
},
{
"category": "self",
"summary": "SUSE Bug 1256605",
"url": "https://bugzilla.suse.com/1256605"
},
{
"category": "self",
"summary": "SUSE Bug 1256606",
"url": "https://bugzilla.suse.com/1256606"
},
{
"category": "self",
"summary": "SUSE Bug 1256607",
"url": "https://bugzilla.suse.com/1256607"
},
{
"category": "self",
"summary": "SUSE Bug 1256608",
"url": "https://bugzilla.suse.com/1256608"
},
{
"category": "self",
"summary": "SUSE Bug 1256609",
"url": "https://bugzilla.suse.com/1256609"
},
{
"category": "self",
"summary": "SUSE Bug 1256610",
"url": "https://bugzilla.suse.com/1256610"
},
{
"category": "self",
"summary": "SUSE Bug 1256611",
"url": "https://bugzilla.suse.com/1256611"
},
{
"category": "self",
"summary": "SUSE Bug 1256612",
"url": "https://bugzilla.suse.com/1256612"
},
{
"category": "self",
"summary": "SUSE Bug 1256613",
"url": "https://bugzilla.suse.com/1256613"
},
{
"category": "self",
"summary": "SUSE Bug 1256616",
"url": "https://bugzilla.suse.com/1256616"
},
{
"category": "self",
"summary": "SUSE Bug 1256617",
"url": "https://bugzilla.suse.com/1256617"
},
{
"category": "self",
"summary": "SUSE Bug 1256619",
"url": "https://bugzilla.suse.com/1256619"
},
{
"category": "self",
"summary": "SUSE Bug 1256622",
"url": "https://bugzilla.suse.com/1256622"
},
{
"category": "self",
"summary": "SUSE Bug 1256623",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "self",
"summary": "SUSE Bug 1256625",
"url": "https://bugzilla.suse.com/1256625"
},
{
"category": "self",
"summary": "SUSE Bug 1256627",
"url": "https://bugzilla.suse.com/1256627"
},
{
"category": "self",
"summary": "SUSE Bug 1256628",
"url": "https://bugzilla.suse.com/1256628"
},
{
"category": "self",
"summary": "SUSE Bug 1256630",
"url": "https://bugzilla.suse.com/1256630"
},
{
"category": "self",
"summary": "SUSE Bug 1256638",
"url": "https://bugzilla.suse.com/1256638"
},
{
"category": "self",
"summary": "SUSE Bug 1256641",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256646",
"url": "https://bugzilla.suse.com/1256646"
},
{
"category": "self",
"summary": "SUSE Bug 1256650",
"url": "https://bugzilla.suse.com/1256650"
},
{
"category": "self",
"summary": "SUSE Bug 1256651",
"url": "https://bugzilla.suse.com/1256651"
},
{
"category": "self",
"summary": "SUSE Bug 1256653",
"url": "https://bugzilla.suse.com/1256653"
},
{
"category": "self",
"summary": "SUSE Bug 1256654",
"url": "https://bugzilla.suse.com/1256654"
},
{
"category": "self",
"summary": "SUSE Bug 1256655",
"url": "https://bugzilla.suse.com/1256655"
},
{
"category": "self",
"summary": "SUSE Bug 1256659",
"url": "https://bugzilla.suse.com/1256659"
},
{
"category": "self",
"summary": "SUSE Bug 1256660",
"url": "https://bugzilla.suse.com/1256660"
},
{
"category": "self",
"summary": "SUSE Bug 1256661",
"url": "https://bugzilla.suse.com/1256661"
},
{
"category": "self",
"summary": "SUSE Bug 1256664",
"url": "https://bugzilla.suse.com/1256664"
},
{
"category": "self",
"summary": "SUSE Bug 1256665",
"url": "https://bugzilla.suse.com/1256665"
},
{
"category": "self",
"summary": "SUSE Bug 1256674",
"url": "https://bugzilla.suse.com/1256674"
},
{
"category": "self",
"summary": "SUSE Bug 1256680",
"url": "https://bugzilla.suse.com/1256680"
},
{
"category": "self",
"summary": "SUSE Bug 1256682",
"url": "https://bugzilla.suse.com/1256682"
},
{
"category": "self",
"summary": "SUSE Bug 1256688",
"url": "https://bugzilla.suse.com/1256688"
},
{
"category": "self",
"summary": "SUSE Bug 1256689",
"url": "https://bugzilla.suse.com/1256689"
},
{
"category": "self",
"summary": "SUSE Bug 1256690",
"url": "https://bugzilla.suse.com/1256690"
},
{
"category": "self",
"summary": "SUSE Bug 1256726",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "self",
"summary": "SUSE Bug 1256728",
"url": "https://bugzilla.suse.com/1256728"
},
{
"category": "self",
"summary": "SUSE Bug 1256730",
"url": "https://bugzilla.suse.com/1256730"
},
{
"category": "self",
"summary": "SUSE Bug 1256733",
"url": "https://bugzilla.suse.com/1256733"
},
{
"category": "self",
"summary": "SUSE Bug 1256737",
"url": "https://bugzilla.suse.com/1256737"
},
{
"category": "self",
"summary": "SUSE Bug 1256741",
"url": "https://bugzilla.suse.com/1256741"
},
{
"category": "self",
"summary": "SUSE Bug 1256742",
"url": "https://bugzilla.suse.com/1256742"
},
{
"category": "self",
"summary": "SUSE Bug 1256744",
"url": "https://bugzilla.suse.com/1256744"
},
{
"category": "self",
"summary": "SUSE Bug 1256748",
"url": "https://bugzilla.suse.com/1256748"
},
{
"category": "self",
"summary": "SUSE Bug 1256749",
"url": "https://bugzilla.suse.com/1256749"
},
{
"category": "self",
"summary": "SUSE Bug 1256752",
"url": "https://bugzilla.suse.com/1256752"
},
{
"category": "self",
"summary": "SUSE Bug 1256754",
"url": "https://bugzilla.suse.com/1256754"
},
{
"category": "self",
"summary": "SUSE Bug 1256756",
"url": "https://bugzilla.suse.com/1256756"
},
{
"category": "self",
"summary": "SUSE Bug 1256757",
"url": "https://bugzilla.suse.com/1256757"
},
{
"category": "self",
"summary": "SUSE Bug 1256759",
"url": "https://bugzilla.suse.com/1256759"
},
{
"category": "self",
"summary": "SUSE Bug 1256760",
"url": "https://bugzilla.suse.com/1256760"
},
{
"category": "self",
"summary": "SUSE Bug 1256761",
"url": "https://bugzilla.suse.com/1256761"
},
{
"category": "self",
"summary": "SUSE Bug 1256763",
"url": "https://bugzilla.suse.com/1256763"
},
{
"category": "self",
"summary": "SUSE Bug 1256770",
"url": "https://bugzilla.suse.com/1256770"
},
{
"category": "self",
"summary": "SUSE Bug 1256773",
"url": "https://bugzilla.suse.com/1256773"
},
{
"category": "self",
"summary": "SUSE Bug 1256774",
"url": "https://bugzilla.suse.com/1256774"
},
{
"category": "self",
"summary": "SUSE Bug 1256777",
"url": "https://bugzilla.suse.com/1256777"
},
{
"category": "self",
"summary": "SUSE Bug 1256779",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "self",
"summary": "SUSE Bug 1256781",
"url": "https://bugzilla.suse.com/1256781"
},
{
"category": "self",
"summary": "SUSE Bug 1256785",
"url": "https://bugzilla.suse.com/1256785"
},
{
"category": "self",
"summary": "SUSE Bug 1256792",
"url": "https://bugzilla.suse.com/1256792"
},
{
"category": "self",
"summary": "SUSE Bug 1256794",
"url": "https://bugzilla.suse.com/1256794"
},
{
"category": "self",
"summary": "SUSE Bug 1256861",
"url": "https://bugzilla.suse.com/1256861"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257035",
"url": "https://bugzilla.suse.com/1257035"
},
{
"category": "self",
"summary": "SUSE Bug 1257053",
"url": "https://bugzilla.suse.com/1257053"
},
{
"category": "self",
"summary": "SUSE Bug 1257154",
"url": "https://bugzilla.suse.com/1257154"
},
{
"category": "self",
"summary": "SUSE Bug 1257155",
"url": "https://bugzilla.suse.com/1257155"
},
{
"category": "self",
"summary": "SUSE Bug 1257158",
"url": "https://bugzilla.suse.com/1257158"
},
{
"category": "self",
"summary": "SUSE Bug 1257163",
"url": "https://bugzilla.suse.com/1257163"
},
{
"category": "self",
"summary": "SUSE Bug 1257164",
"url": "https://bugzilla.suse.com/1257164"
},
{
"category": "self",
"summary": "SUSE Bug 1257167",
"url": "https://bugzilla.suse.com/1257167"
},
{
"category": "self",
"summary": "SUSE Bug 1257168",
"url": "https://bugzilla.suse.com/1257168"
},
{
"category": "self",
"summary": "SUSE Bug 1257180",
"url": "https://bugzilla.suse.com/1257180"
},
{
"category": "self",
"summary": "SUSE Bug 1257202",
"url": "https://bugzilla.suse.com/1257202"
},
{
"category": "self",
"summary": "SUSE Bug 1257204",
"url": "https://bugzilla.suse.com/1257204"
},
{
"category": "self",
"summary": "SUSE Bug 1257207",
"url": "https://bugzilla.suse.com/1257207"
},
{
"category": "self",
"summary": "SUSE Bug 1257208",
"url": "https://bugzilla.suse.com/1257208"
},
{
"category": "self",
"summary": "SUSE Bug 1257215",
"url": "https://bugzilla.suse.com/1257215"
},
{
"category": "self",
"summary": "SUSE Bug 1257217",
"url": "https://bugzilla.suse.com/1257217"
},
{
"category": "self",
"summary": "SUSE Bug 1257218",
"url": "https://bugzilla.suse.com/1257218"
},
{
"category": "self",
"summary": "SUSE Bug 1257220",
"url": "https://bugzilla.suse.com/1257220"
},
{
"category": "self",
"summary": "SUSE Bug 1257221",
"url": "https://bugzilla.suse.com/1257221"
},
{
"category": "self",
"summary": "SUSE Bug 1257227",
"url": "https://bugzilla.suse.com/1257227"
},
{
"category": "self",
"summary": "SUSE Bug 1257232",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "self",
"summary": "SUSE Bug 1257234",
"url": "https://bugzilla.suse.com/1257234"
},
{
"category": "self",
"summary": "SUSE Bug 1257236",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "self",
"summary": "SUSE Bug 1257245",
"url": "https://bugzilla.suse.com/1257245"
},
{
"category": "self",
"summary": "SUSE Bug 1257277",
"url": "https://bugzilla.suse.com/1257277"
},
{
"category": "self",
"summary": "SUSE Bug 1257282",
"url": "https://bugzilla.suse.com/1257282"
},
{
"category": "self",
"summary": "SUSE Bug 1257296",
"url": "https://bugzilla.suse.com/1257296"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257603",
"url": "https://bugzilla.suse.com/1257603"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53714 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54013 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27005 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42103 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53149 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56721 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37744 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37751 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38209 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38243 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38322 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38539 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39689 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39689/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39829 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39836 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39880 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40106 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40136 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40238 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40254 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40257 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40259 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40264 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40328 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40350 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40355 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68174 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68215 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68227 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68241 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68245 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68254 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68284 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68285 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68296 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68297 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68301 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68320 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68325 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68327 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68365 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68366 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68367 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68372 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68733 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68764 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68768 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68770 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68771 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68773 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68775 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68776 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68777 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68783 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68783/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68789 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68797 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68798 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68800 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68801 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68802 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68803 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68804 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68808 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68814 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68815 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68816 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68820 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71076 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71077 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71078 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71089 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71091 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71094 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71095 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71096 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71100 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71108 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71112 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71114 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71136 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71137 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71138 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71143 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71145 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71147 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71163 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22976 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22977 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22978 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22984 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22985 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22988 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22990 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22991 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22991/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22992 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22993 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22996 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22997 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23005 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23006 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23011 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23011/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-02-20T10:04:28Z",
"generator": {
"date": "2026-02-20T10:04:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0587-1",
"initial_release_date": "2026-02-20T10:04:28Z",
"revision_history": [
{
"date": "2026-02-20T10:04:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150700.7.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150700.7.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150700.7.31.2.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150700.7.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150700.7.31.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP7",
"product": {
"name": "SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150700.7.31.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150700.7.31.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150700.7.31.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53714"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/stm: ltdc: fix late dereference check\n\nIn ltdc_crtc_set_crc_source(), struct drm_crtc was dereferenced in a\ncontainer_of() before the pointer check. This could cause a kernel panic.\n\nFix this smatch warning:\ndrivers/gpu/drm/stm/ltdc.c:1124 ltdc_crtc_set_crc_source() warn: variable dereferenced before check \u0027crtc\u0027 (see line 1119)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53714",
"url": "https://www.suse.com/security/cve/CVE-2023-53714"
},
{
"category": "external",
"summary": "SUSE Bug 1254465 for CVE-2023-53714",
"url": "https://bugzilla.suse.com/1254465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2023-53714"
},
{
"cve": "CVE-2023-54013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54013"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: Fix locking for runpm vs reclaim\n\nFor cases where icc_bw_set() can be called in callbaths that could\ndeadlock against shrinker/reclaim, such as runpm resume, we need to\ndecouple the icc locking. Introduce a new icc_bw_lock for cases where\nwe need to serialize bw aggregation and update to decouple that from\npaths that require memory allocation such as node/link creation/\ndestruction.\n\nFixes this lockdep splat:\n\n ======================================================\n WARNING: possible circular locking dependency detected\n 6.2.0-rc8-debug+ #554 Not tainted\n ------------------------------------------------------\n ring0/132 is trying to acquire lock:\n ffffff80871916d0 (\u0026gmu-\u003elock){+.+.}-{3:3}, at: a6xx_pm_resume+0xf0/0x234\n\n but task is already holding lock:\n ffffffdb5aee57e8 (dma_fence_map){++++}-{0:0}, at: msm_job_run+0x68/0x150\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #4 (dma_fence_map){++++}-{0:0}:\n __dma_fence_might_wait+0x74/0xc0\n dma_resv_lockdep+0x1f4/0x2f4\n do_one_initcall+0x104/0x2bc\n kernel_init_freeable+0x344/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #3 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}:\n fs_reclaim_acquire+0x80/0xa8\n slab_pre_alloc_hook.constprop.0+0x40/0x25c\n __kmem_cache_alloc_node+0x60/0x1cc\n __kmalloc+0xd8/0x100\n topology_parse_cpu_capacity+0x8c/0x178\n get_cpu_for_node+0x88/0xc4\n parse_cluster+0x1b0/0x28c\n parse_cluster+0x8c/0x28c\n init_cpu_topology+0x168/0x188\n smp_prepare_cpus+0x24/0xf8\n kernel_init_freeable+0x18c/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #2 (fs_reclaim){+.+.}-{0:0}:\n __fs_reclaim_acquire+0x3c/0x48\n fs_reclaim_acquire+0x54/0xa8\n slab_pre_alloc_hook.constprop.0+0x40/0x25c\n __kmem_cache_alloc_node+0x60/0x1cc\n __kmalloc+0xd8/0x100\n kzalloc.constprop.0+0x14/0x20\n icc_node_create_nolock+0x4c/0xc4\n icc_node_create+0x38/0x58\n qcom_icc_rpmh_probe+0x1b8/0x248\n platform_probe+0x70/0xc4\n really_probe+0x158/0x290\n __driver_probe_device+0xc8/0xe0\n driver_probe_device+0x44/0x100\n __driver_attach+0xf8/0x108\n bus_for_each_dev+0x78/0xc4\n driver_attach+0x2c/0x38\n bus_add_driver+0xd0/0x1d8\n driver_register+0xbc/0xf8\n __platform_driver_register+0x30/0x3c\n qnoc_driver_init+0x24/0x30\n do_one_initcall+0x104/0x2bc\n kernel_init_freeable+0x344/0x34c\n kernel_init+0x30/0x134\n ret_from_fork+0x10/0x20\n\n -\u003e #1 (icc_lock){+.+.}-{3:3}:\n __mutex_lock+0xcc/0x3c8\n mutex_lock_nested+0x30/0x44\n icc_set_bw+0x88/0x2b4\n _set_opp_bw+0x8c/0xd8\n _set_opp+0x19c/0x300\n dev_pm_opp_set_opp+0x84/0x94\n a6xx_gmu_resume+0x18c/0x804\n a6xx_pm_resume+0xf8/0x234\n adreno_runtime_resume+0x2c/0x38\n pm_generic_runtime_resume+0x30/0x44\n __rpm_callback+0x15c/0x174\n rpm_callback+0x78/0x7c\n rpm_resume+0x318/0x524\n __pm_runtime_resume+0x78/0xbc\n adreno_load_gpu+0xc4/0x17c\n msm_open+0x50/0x120\n drm_file_alloc+0x17c/0x228\n drm_open_helper+0x74/0x118\n drm_open+0xa0/0x144\n drm_stub_open+0xd4/0xe4\n chrdev_open+0x1b8/0x1e4\n do_dentry_open+0x2f8/0x38c\n vfs_open+0x34/0x40\n path_openat+0x64c/0x7b4\n do_filp_open+0x54/0xc4\n do_sys_openat2+0x9c/0x100\n do_sys_open+0x50/0x7c\n __arm64_sys_openat+0x28/0x34\n invoke_syscall+0x8c/0x128\n el0_svc_common.constprop.0+0xa0/0x11c\n do_el0_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54013",
"url": "https://www.suse.com/security/cve/CVE-2023-54013"
},
{
"category": "external",
"summary": "SUSE Bug 1256280 for CVE-2023-54013",
"url": "https://bugzilla.suse.com/1256280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2023-54013"
},
{
"cve": "CVE-2024-27005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27005"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: Don\u0027t access req_list while it\u0027s being manipulated\n\nThe icc_lock mutex was split into separate icc_lock and icc_bw_lock\nmutexes in [1] to avoid lockdep splats. However, this didn\u0027t adequately\nprotect access to icc_node::req_list.\n\nThe icc_set_bw() function will eventually iterate over req_list while\nonly holding icc_bw_lock, but req_list can be modified while only\nholding icc_lock. This causes races between icc_set_bw(), of_icc_get(),\nand icc_put().\n\nExample A:\n\n CPU0 CPU1\n ---- ----\n icc_set_bw(path_a)\n mutex_lock(\u0026icc_bw_lock);\n icc_put(path_b)\n mutex_lock(\u0026icc_lock);\n aggregate_requests()\n hlist_for_each_entry(r, ...\n hlist_del(...\n \u003cr = invalid pointer\u003e\n\nExample B:\n\n CPU0 CPU1\n ---- ----\n icc_set_bw(path_a)\n mutex_lock(\u0026icc_bw_lock);\n path_b = of_icc_get()\n of_icc_get_by_index()\n mutex_lock(\u0026icc_lock);\n path_find()\n path_init()\n aggregate_requests()\n hlist_for_each_entry(r, ...\n hlist_add_head(...\n \u003cr = invalid pointer\u003e\n\nFix this by ensuring icc_bw_lock is always held before manipulating\nicc_node::req_list. The additional places icc_bw_lock is held don\u0027t\nperform any memory allocations, so we should still be safe from the\noriginal lockdep splats that motivated the separate locks.\n\n[1] commit af42269c3523 (\"interconnect: Fix locking for runpm vs reclaim\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27005",
"url": "https://www.suse.com/security/cve/CVE-2024-27005"
},
{
"category": "external",
"summary": "SUSE Bug 1223800 for CVE-2024-27005",
"url": "https://bugzilla.suse.com/1223800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-27005"
},
{
"cve": "CVE-2024-42103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix adding block group to a reclaim list and the unused list during reclaim\n\nThere is a potential parallel list adding for retrying in\nbtrfs_reclaim_bgs_work and adding to the unused list. Since the block\ngroup is removed from the reclaim list and it is on a relocation work,\nit can be added into the unused list in parallel. When that happens,\nadding it to the reclaim list will corrupt the list head and trigger\nlist corruption like below.\n\nFix it by taking fs_info-\u003eunused_bgs_lock.\n\n [177.504][T2585409] BTRFS error (device nullb1): error relocating ch= unk 2415919104\n [177.514][T2585409] list_del corruption. next-\u003eprev should be ff1100= 0344b119c0, but was ff11000377e87c70. (next=3Dff110002390cd9c0)\n [177.529][T2585409] ------------[ cut here ]------------\n [177.537][T2585409] kernel BUG at lib/list_debug.c:65!\n [177.545][T2585409] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\n [177.555][T2585409] CPU: 9 PID: 2585409 Comm: kworker/u128:2 Tainted: G W 6.10.0-rc5-kts #1\n [177.568][T2585409] Hardware name: Supermicro SYS-520P-WTR/X12SPW-TF, BIOS 1.2 02/14/2022\n [177.579][T2585409] Workqueue: events_unbound btrfs_reclaim_bgs_work[btrfs]\n [177.589][T2585409] RIP: 0010:__list_del_entry_valid_or_report.cold+0x70/0x72\n [177.624][T2585409] RSP: 0018:ff11000377e87a70 EFLAGS: 00010286\n [177.633][T2585409] RAX: 000000000000006d RBX: ff11000344b119c0 RCX:0000000000000000\n [177.644][T2585409] RDX: 000000000000006d RSI: 0000000000000008 RDI:ffe21c006efd0f40\n [177.655][T2585409] RBP: ff110002e0509f78 R08: 0000000000000001 R09:ffe21c006efd0f08\n [177.665][T2585409] R10: ff11000377e87847 R11: 0000000000000000 R12:ff110002390cd9c0\n [177.676][T2585409] R13: ff11000344b119c0 R14: ff110002e0508000 R15:dffffc0000000000\n [177.687][T2585409] FS: 0000000000000000(0000) GS:ff11000fec880000(0000) knlGS:0000000000000000\n [177.700][T2585409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [177.709][T2585409] CR2: 00007f06bc7b1978 CR3: 0000001021e86005 CR4:0000000000771ef0\n [177.720][T2585409] DR0: 0000000000000000 DR1: 0000000000000000 DR2:0000000000000000\n [177.731][T2585409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:0000000000000400\n [177.742][T2585409] PKRU: 55555554\n [177.748][T2585409] Call Trace:\n [177.753][T2585409] \u003cTASK\u003e\n [177.759][T2585409] ? __die_body.cold+0x19/0x27\n [177.766][T2585409] ? die+0x2e/0x50\n [177.772][T2585409] ? do_trap+0x1ea/0x2d0\n [177.779][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.788][T2585409] ? do_error_trap+0xa3/0x160\n [177.795][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.805][T2585409] ? handle_invalid_op+0x2c/0x40\n [177.812][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.820][T2585409] ? exc_invalid_op+0x2d/0x40\n [177.827][T2585409] ? asm_exc_invalid_op+0x1a/0x20\n [177.834][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.843][T2585409] btrfs_delete_unused_bgs+0x3d9/0x14c0 [btrfs]\n\nThere is a similar retry_list code in btrfs_delete_unused_bgs(), but it is\nsafe, AFAICS. Since the block group was in the unused list, the used bytes\nshould be 0 when it was added to the unused list. Then, it checks\nblock_group-\u003e{used,reserved,pinned} are still 0 under the\nblock_group-\u003elock. So, they should be still eligible for the unused list,\nnot the reclaim list.\n\nThe reason it is safe there it\u0027s because because we\u0027re holding\nspace_info-\u003egroups_sem in write mode.\n\nThat means no other task can allocate from the block group, so while we\nare at deleted_unused_bgs() it\u0027s not possible for other tasks to\nallocate and deallocate extents from the block group, so it can\u0027t be\nadded to the unused list or the reclaim list by anyone else.\n\nThe bug can be reproduced by btrfs/166 after a few rounds. In practice\nthis can be hit when relocation cannot find more chunk space and ends\nwith ENOSPC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42103",
"url": "https://www.suse.com/security/cve/CVE-2024-42103"
},
{
"category": "external",
"summary": "SUSE Bug 1228490 for CVE-2024-42103",
"url": "https://bugzilla.suse.com/1228490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-42103"
},
{
"cve": "CVE-2024-53070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\n\nIf the device was already runtime suspended then during system suspend\nwe cannot access the device registers else it will crash.\n\nAlso we cannot access any registers after dwc3_core_exit() on some\nplatforms so move the dwc3_enable_susphy() call to the top.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53070",
"url": "https://www.suse.com/security/cve/CVE-2024-53070"
},
{
"category": "external",
"summary": "SUSE Bug 1233563 for CVE-2024-53070",
"url": "https://bugzilla.suse.com/1233563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-53070"
},
{
"cve": "CVE-2024-53149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: glink: fix off-by-one in connector_status\n\nUCSI connector\u0027s indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS.\nCorrect the condition in the pmic_glink_ucsi_connector_status()\ncallback, fixing Type-C orientation reporting for the third USB-C\nconnector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53149",
"url": "https://www.suse.com/security/cve/CVE-2024-53149"
},
{
"category": "external",
"summary": "SUSE Bug 1234842 for CVE-2024-53149",
"url": "https://bugzilla.suse.com/1234842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2024-53149"
},
{
"cve": "CVE-2024-56721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56721"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/CPU/AMD: Terminate the erratum_1386_microcode array\n\nThe erratum_1386_microcode array requires an empty entry at the end.\nOtherwise x86_match_cpu_with_stepping() will continue iterate the array after\nit ended.\n\nAdd an empty entry to erratum_1386_microcode to its end.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56721",
"url": "https://www.suse.com/security/cve/CVE-2024-56721"
},
{
"category": "external",
"summary": "SUSE Bug 1235566 for CVE-2024-56721",
"url": "https://bugzilla.suse.com/1235566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-56721"
},
{
"cve": "CVE-2025-22047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix __apply_microcode_amd()\u0027s return value\n\nWhen verify_sha256_digest() fails, __apply_microcode_amd() should propagate\nthe failure by returning false (and not -1 which is promoted to true).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22047",
"url": "https://www.suse.com/security/cve/CVE-2025-22047"
},
{
"category": "external",
"summary": "SUSE Bug 1241437 for CVE-2025-22047",
"url": "https://bugzilla.suse.com/1241437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-22047"
},
{
"cve": "CVE-2025-37744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix memory leak in ath12k_pci_remove()\n\nKmemleak reported this error:\n\n unreferenced object 0xffff1c165cec3060 (size 32):\n comm \"insmod\", pid 560, jiffies 4296964570 (age 235.596s)\n backtrace:\n [\u003c000000005434db68\u003e] __kmem_cache_alloc_node+0x1f4/0x2c0\n [\u003c000000001203b155\u003e] kmalloc_trace+0x40/0x88\n [\u003c0000000028adc9c8\u003e] _request_firmware+0xb8/0x608\n [\u003c00000000cad1aef7\u003e] firmware_request_nowarn+0x50/0x80\n [\u003c000000005011a682\u003e] local_pci_probe+0x48/0xd0\n [\u003c00000000077cd295\u003e] pci_device_probe+0xb4/0x200\n [\u003c0000000087184c94\u003e] really_probe+0x150/0x2c0\n\nThe firmware memory was allocated in ath12k_pci_probe(), but not\nfreed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is\nset. So call ath12k_fw_unmap() to free the memory.\n\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37744",
"url": "https://www.suse.com/security/cve/CVE-2025-37744"
},
{
"category": "external",
"summary": "SUSE Bug 1243662 for CVE-2025-37744",
"url": "https://bugzilla.suse.com/1243662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-37744"
},
{
"cve": "CVE-2025-37751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37751"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/cpu: Avoid running off the end of an AMD erratum table\n\nThe NULL array terminator at the end of erratum_1386_microcode was\nremoved during the switch from x86_cpu_desc to x86_cpu_id. This\ncauses readers to run off the end of the array.\n\nReplace the NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37751",
"url": "https://www.suse.com/security/cve/CVE-2025-37751"
},
{
"category": "external",
"summary": "SUSE Bug 1242505 for CVE-2025-37751",
"url": "https://bugzilla.suse.com/1242505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-37751"
},
{
"cve": "CVE-2025-37813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix invalid pointer dereference in Etron workaround\n\nThis check is performed before prepare_transfer() and prepare_ring(), so\nenqueue can already point at the final link TRB of a segment. And indeed\nit will, some 0.4% of times this code is called.\n\nThen enqueue + 1 is an invalid pointer. It will crash the kernel right\naway or load some junk which may look like a link TRB and cause the real\nlink TRB to be replaced with a NOOP. This wouldn\u0027t end well.\n\nUse a functionally equivalent test which doesn\u0027t dereference the pointer\nand always gives correct result.\n\nSomething has crashed my machine twice in recent days while playing with\nan Etron HC, and a control transfer stress test ran for confirmation has\njust crashed it again. The same test passes with this patch applied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37813",
"url": "https://www.suse.com/security/cve/CVE-2025-37813"
},
{
"category": "external",
"summary": "SUSE Bug 1242909 for CVE-2025-37813",
"url": "https://bugzilla.suse.com/1242909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-37813"
},
{
"cve": "CVE-2025-38209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: remove tag set when second admin queue config fails\n\nCommit 104d0e2f6222 (\"nvme-fabrics: reset admin connection for secure\nconcatenation\") modified nvme_tcp_setup_ctrl() to call\nnvme_tcp_configure_admin_queue() twice. The first call prepares for\nDH-CHAP negotitation, and the second call is required for secure\nconcatenation. However, this change triggered BUG KASAN slab-use-after-\nfree in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by\nrepeating the blktests test case nvme/063 a few times [1].\n\nWhen the BUG happens, nvme_tcp_create_ctrl() fails in the call chain\nbelow:\n\nnvme_tcp_create_ctrl()\n nvme_tcp_alloc_ctrl() new=true ... Alloc nvme_tcp_ctrl and admin_tag_set\n nvme_tcp_setup_ctrl() new=true\n nvme_tcp_configure_admin_queue() new=true ... Succeed\n nvme_alloc_admin_tag_set() ... Alloc the tag set for admin_tag_set\n nvme_stop_keep_alive()\n nvme_tcp_teardown_admin_queue() remove=false\n nvme_tcp_configure_admin_queue() new=false\n nvme_tcp_alloc_admin_queue() ... Fail, but do not call nvme_remove_admin_tag_set()\n nvme_uninit_ctrl()\n nvme_put_ctrl() ... Free up the nvme_tcp_ctrl and admin_tag_set\n\nThe first call of nvme_tcp_configure_admin_queue() succeeds with\nnew=true argument. The second call fails with new=false argument. This\nsecond call does not call nvme_remove_admin_tag_set() on failure, due to\nthe new=false argument. Then the admin tag set is not removed. However,\nnvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call\nnvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which\nhas admin_tag_set field. Later on, the timeout handler accesses the\nadmin_tag_set field and causes the BUG KASAN slab-use-after-free.\n\nTo not leave the admin tag set, call nvme_remove_admin_tag_set() when\nthe second nvme_tcp_configure_admin_queue() call fails. Do not return\nfrom nvme_tcp_setup_ctrl() on failure. Instead, jump to \"destroy_admin\"\ngo-to label to call nvme_tcp_teardown_admin_queue() which calls\nnvme_remove_admin_tag_set().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38209",
"url": "https://www.suse.com/security/cve/CVE-2025-38209"
},
{
"category": "external",
"summary": "SUSE Bug 1246022 for CVE-2025-38209",
"url": "https://bugzilla.suse.com/1246022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-38209"
},
{
"cve": "CVE-2025-38243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix invalid inode pointer dereferences during log replay\n\nIn a few places where we call read_one_inode(), if we get a NULL pointer\nwe end up jumping into an error path, or fallthrough in case of\n__add_inode_ref(), where we then do something like this:\n\n iput(\u0026inode-\u003evfs_inode);\n\nwhich results in an invalid inode pointer that triggers an invalid memory\naccess, resulting in a crash.\n\nFix this by making sure we don\u0027t do such dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38243",
"url": "https://www.suse.com/security/cve/CVE-2025-38243"
},
{
"category": "external",
"summary": "SUSE Bug 1246184 for CVE-2025-38243",
"url": "https://bugzilla.suse.com/1246184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-38243"
},
{
"cve": "CVE-2025-38322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38322"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: Fix crash in icl_update_topdown_event()\n\nThe perf_fuzzer found a hard-lockup crash on a RaptorLake machine:\n\n Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000\n CPU: 23 UID: 0 PID: 0 Comm: swapper/23\n Tainted: [W]=WARN\n Hardware name: Dell Inc. Precision 9660/0VJ762\n RIP: 0010:native_read_pmc+0x7/0x40\n Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ...\n RSP: 000:fffb03100273de8 EFLAGS: 00010046\n ....\n Call Trace:\n \u003cTASK\u003e\n icl_update_topdown_event+0x165/0x190\n ? ktime_get+0x38/0xd0\n intel_pmu_read_event+0xf9/0x210\n __perf_event_read+0xf9/0x210\n\nCPUs 16-23 are E-core CPUs that don\u0027t support the perf metrics feature.\nThe icl_update_topdown_event() should not be invoked on these CPUs.\n\nIt\u0027s a regression of commit:\n\n f9bdf1f95339 (\"perf/x86/intel: Avoid disable PMU if !cpuc-\u003eenabled in sample read\")\n\nThe bug introduced by that commit is that the is_topdown_event() function\nis mistakenly used to replace the is_topdown_count() call to check if the\ntopdown functions for the perf metrics feature should be invoked.\n\nFix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38322",
"url": "https://www.suse.com/security/cve/CVE-2025-38322"
},
{
"category": "external",
"summary": "SUSE Bug 1246447 for CVE-2025-38322",
"url": "https://bugzilla.suse.com/1246447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with -\u003equery_interface\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we\u0027re queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38379",
"url": "https://www.suse.com/security/cve/CVE-2025-38379"
},
{
"category": "external",
"summary": "SUSE Bug 1247030 for CVE-2025-38379",
"url": "https://bugzilla.suse.com/1247030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-38379"
},
{
"cve": "CVE-2025-38539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38539"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38539",
"url": "https://www.suse.com/security/cve/CVE-2025-38539"
},
{
"category": "external",
"summary": "SUSE Bug 1248211 for CVE-2025-38539",
"url": "https://bugzilla.suse.com/1248211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-38539"
},
{
"cve": "CVE-2025-39689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39689"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn\u0027t have to differentiate when to free the\niterator\u0027s hash between writers and readers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39689",
"url": "https://www.suse.com/security/cve/CVE-2025-39689"
},
{
"category": "external",
"summary": "SUSE Bug 1249307 for CVE-2025-39689",
"url": "https://bugzilla.suse.com/1249307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix potential warning in trace_printk_seq during ftrace_dump\n\nWhen calling ftrace_dump_one() concurrently with reading trace_pipe,\na WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race\ncondition.\n\nThe issue occurs because:\n\nCPU0 (ftrace_dump) CPU1 (reader)\necho z \u003e /proc/sysrq-trigger\n\n!trace_empty(\u0026iter)\ntrace_iterator_reset(\u0026iter) \u003c- len = size = 0\n cat /sys/kernel/tracing/trace_pipe\ntrace_find_next_entry_inc(\u0026iter)\n __find_next_entry\n ring_buffer_empty_cpu \u003c- all empty\n return NULL\n\ntrace_printk_seq(\u0026iter.seq)\n WARN_ON_ONCE(s-\u003eseq.len \u003e= s-\u003eseq.size)\n\nIn the context between trace_empty() and trace_find_next_entry_inc()\nduring ftrace_dump, the ring buffer data was consumed by other readers.\nThis caused trace_find_next_entry_inc to return NULL, failing to populate\n`iter.seq`. At this point, due to the prior trace_iterator_reset, both\n`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,\nthe WARN_ON_ONCE condition is triggered.\n\nMove the trace_printk_seq() into the if block that checks to make sure the\nreturn value of trace_find_next_entry_inc() is non-NULL in\nftrace_dump_one(), ensuring the \u0027iter.seq\u0027 is properly populated before\nsubsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39813",
"url": "https://www.suse.com/security/cve/CVE-2025-39813"
},
{
"category": "external",
"summary": "SUSE Bug 1250032 for CVE-2025-39813",
"url": "https://bugzilla.suse.com/1250032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39829"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntrace/fgraph: Fix the warning caused by missing unregister notifier\n\nThis warning was triggered during testing on v6.16:\n\nnotifier callback ftrace_suspend_notifier_call already registered\nWARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0\n...\nCall Trace:\n \u003cTASK\u003e\n blocking_notifier_chain_register+0x34/0x60\n register_ftrace_graph+0x330/0x410\n ftrace_profile_write+0x1e9/0x340\n vfs_write+0xf8/0x420\n ? filp_flush+0x8a/0xa0\n ? filp_close+0x1f/0x30\n ? do_dup2+0xaf/0x160\n ksys_write+0x65/0xe0\n do_syscall_64+0xa4/0x260\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen writing to the function_profile_enabled interface, the notifier was\nnot unregistered after start_graph_tracing failed, causing a warning the\nnext time function_profile_enabled was written.\n\nFixed by adding unregister_pm_notifier in the exception path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39829",
"url": "https://www.suse.com/security/cve/CVE-2025-39829"
},
{
"category": "external",
"summary": "SUSE Bug 1250082 for CVE-2025-39829",
"url": "https://bugzilla.suse.com/1250082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39829"
},
{
"cve": "CVE-2025-39836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39836"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: stmm: Fix incorrect buffer allocation method\n\nThe communication buffer allocated by setup_mm_hdr() is later on passed\nto tee_shm_register_kernel_buf(). The latter expects those buffers to be\ncontiguous pages, but setup_mm_hdr() just uses kmalloc(). That can cause\nvarious corruptions or BUGs, specifically since commit 9aec2fb0fd5e\n(\"slab: allocate frozen pages\"), though it was broken before as well.\n\nFix this by using alloc_pages_exact() instead of kmalloc().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39836",
"url": "https://www.suse.com/security/cve/CVE-2025-39836"
},
{
"category": "external",
"summary": "SUSE Bug 1249904 for CVE-2025-39836",
"url": "https://bugzilla.suse.com/1249904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39836"
},
{
"cve": "CVE-2025-39880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix invalid accesses to ceph_connection_v1_info\n\nThere is a place where generic code in messenger.c is reading and\nanother place where it is writing to con-\u003ev1 union member without\nchecking that the union member is active (i.e. msgr1 is in use).\n\nOn 64-bit systems, con-\u003ev1.auth_retry overlaps with con-\u003ev2.out_iter,\nso such a read is almost guaranteed to return a bogus value instead of\n0 when msgr2 is in use. This ends up being fairly benign because the\nside effect is just the invalidation of the authorizer and successive\nfetching of new tickets.\n\ncon-\u003ev1.connect_seq overlaps with con-\u003ev2.conn_bufs and the fact that\nit\u0027s being written to can cause more serious consequences, but luckily\nit\u0027s not something that happens often.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39880",
"url": "https://www.suse.com/security/cve/CVE-2025-39880"
},
{
"category": "external",
"summary": "SUSE Bug 1250388 for CVE-2025-39880",
"url": "https://bugzilla.suse.com/1250388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39880"
},
{
"cve": "CVE-2025-39913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39913"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork.\n\nsyzbot reported the splat below. [0]\n\nThe repro does the following:\n\n 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes)\n 2. Attach the prog to a SOCKMAP\n 3. Add a socket to the SOCKMAP\n 4. Activate fault injection\n 5. Send data less than cork_bytes\n\nAt 5., the data is carried over to the next sendmsg() as it is\nsmaller than the cork_bytes specified by bpf_msg_cork_bytes().\n\nThen, tcp_bpf_send_verdict() tries to allocate psock-\u003ecork to hold\nthe data, but this fails silently due to fault injection + __GFP_NOWARN.\n\nIf the allocation fails, we need to revert the sk-\u003esk_forward_alloc\nchange done by sk_msg_alloc().\n\nLet\u0027s call sk_msg_free() when tcp_bpf_send_verdict fails to allocate\npsock-\u003ecork.\n\nThe \"*copied\" also needs to be updated such that a proper error can\nbe returned to the caller, sendmsg. It fails to allocate psock-\u003ecork.\nNothing has been corked so far, so this patch simply sets \"*copied\"\nto 0.\n\n[0]:\nWARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983\nModules linked in:\nCPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156\nCode: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 \u003c0f\u003e 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc\nRSP: 0018:ffffc90000a08b48 EFLAGS: 00010246\nRAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80\nRDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000\nRBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4\nR10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380\nR13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872\nFS: 00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0\nCall Trace:\n \u003cIRQ\u003e\n __sk_destruct+0x86/0x660 net/core/sock.c:2339\n rcu_do_batch kernel/rcu/tree.c:2605 [inline]\n rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861\n handle_softirqs+0x286/0x870 kernel/softirq.c:579\n __do_softirq kernel/softirq.c:613 [inline]\n invoke_softirq kernel/softirq.c:453 [inline]\n __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680\n irq_exit_rcu+0x9/0x30 kernel/softirq.c:696\n instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]\n sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39913",
"url": "https://www.suse.com/security/cve/CVE-2025-39913"
},
{
"category": "external",
"summary": "SUSE Bug 1250705 for CVE-2025-39913",
"url": "https://bugzilla.suse.com/1250705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-39913"
},
{
"cve": "CVE-2025-40097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix missing pointer check in hda_component_manager_init function\n\nThe __component_match_add function may assign the \u0027matchptr\u0027 pointer\nthe value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.\n\nThe call stack leading to the error looks like this:\n\nhda_component_manager_init\n|-\u003e component_match_add\n |-\u003e component_match_add_release\n |-\u003e __component_match_add ( ... ,**matchptr, ... )\n |-\u003e *matchptr = ERR_PTR(-ENOMEM); // assign\n|-\u003e component_master_add_with_match( ... match)\n |-\u003e component_match_realloc(match, match-\u003enum); // dereference\n\nAdd IS_ERR() check to prevent the crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40097",
"url": "https://www.suse.com/security/cve/CVE-2025-40097"
},
{
"category": "external",
"summary": "SUSE Bug 1252900 for CVE-2025-40097",
"url": "https://bugzilla.suse.com/1252900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40097"
},
{
"cve": "CVE-2025-40106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40106"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix divide-by-zero in comedi_buf_munge()\n\nThe comedi_buf_munge() function performs a modulo operation\n`async-\u003emunge_chan %= async-\u003ecmd.chanlist_len` without first\nchecking if chanlist_len is zero. If a user program submits a command with\nchanlist_len set to zero, this causes a divide-by-zero error when the device\nprocesses data in the interrupt handler path.\n\nAdd a check for zero chanlist_len at the beginning of the\nfunction, similar to the existing checks for !map and\nCMDF_RAWDATA flag. When chanlist_len is zero, update\nmunge_count and return early, indicating the data was\nhandled without munging.\n\nThis prevents potential kernel panics from malformed user commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40106",
"url": "https://www.suse.com/security/cve/CVE-2025-40106"
},
{
"category": "external",
"summary": "SUSE Bug 1252891 for CVE-2025-40106",
"url": "https://bugzilla.suse.com/1252891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40106"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - request reserved interrupt for virtual function\n\nThe device interrupt vector 3 is an error interrupt for\nphysical function and a reserved interrupt for virtual function.\nHowever, the driver has not registered the reserved interrupt for\nvirtual function. When allocating interrupts, the number of interrupts\nis allocated based on powers of two, which includes this interrupt.\nWhen the system enables GICv4 and the virtual function passthrough\nto the virtual machine, releasing the interrupt in the driver\ntriggers a warning.\n\nThe WARNING report is:\nWARNING: CPU: 62 PID: 14889 at arch/arm64/kvm/vgic/vgic-its.c:852 its_free_ite+0x94/0xb4\n\nTherefore, register a reserved interrupt for VF and set the\nIRQF_NO_AUTOEN flag to avoid that warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40136",
"url": "https://www.suse.com/security/cve/CVE-2025-40136"
},
{
"category": "external",
"summary": "SUSE Bug 1253340 for CVE-2025-40136",
"url": "https://bugzilla.suse.com/1253340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40136"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP\n\nWhen running as an SNP or TDX guest under KVM, force the legacy PCI hole,\ni.e. memory between Top of Lower Usable DRAM and 4GiB, to be mapped as UC\nvia a forced variable MTRR range.\n\nIn most KVM-based setups, legacy devices such as the HPET and TPM are\nenumerated via ACPI. ACPI enumeration includes a Memory32Fixed entry, and\noptionally a SystemMemory descriptor for an OperationRegion, e.g. if the\ndevice needs to be accessed via a Control Method.\n\nIf a SystemMemory entry is present, then the kernel\u0027s ACPI driver will\nauto-ioremap the region so that it can be accessed at will. However, the\nACPI spec doesn\u0027t provide a way to enumerate the memory type of\nSystemMemory regions, i.e. there\u0027s no way to tell software that a region\nmust be mapped as UC vs. WB, etc. As a result, Linux\u0027s ACPI driver always\nmaps SystemMemory regions using ioremap_cache(), i.e. as WB on x86.\n\nThe dedicated device drivers however, e.g. the HPET driver and TPM driver,\nwant to map their associated memory as UC or WC, as accessing PCI devices\nusing WB is unsupported.\n\nOn bare metal and non-CoCO, the conflicting requirements \"work\" as firmware\nconfigures the PCI hole (and other device memory) to be UC in the MTRRs.\nSo even though the ACPI mappings request WB, they are forced to UC- in the\nkernel\u0027s tracking due to the kernel properly handling the MTRR overrides,\nand thus are compatible with the drivers\u0027 requested WC/UC-.\n\nWith force WB MTRRs on SNP and TDX guests, the ACPI mappings get their\nrequested WB if the ACPI mappings are established before the dedicated\ndriver code attempts to initialize the device. E.g. if acpi_init()\nruns before the corresponding device driver is probed, ACPI\u0027s WB mapping\nwill \"win\", and result in the driver\u0027s ioremap() failing because the\nexisting WB mapping isn\u0027t compatible with the requested WC/UC-.\n\nE.g. when a TPM is emulated by the hypervisor (ignoring the security\nimplications of relying on what is allegedly an untrusted entity to store\nmeasurements), the TPM driver will request UC and fail:\n\n [ 1.730459] ioremap error for 0xfed40000-0xfed45000, requested 0x2, got 0x0\n [ 1.732780] tpm_tis MSFT0101:00: probe with driver tpm_tis failed with error -12\n\nNote, the \u00270x2\u0027 and \u00270x0\u0027 values refer to \"enum page_cache_mode\", not x86\u0027s\nmemtypes (which frustratingly are an almost pure inversion; 2 == WB, 0 == UC).\nE.g. tracing mapping requests for TPM TIS yields:\n\n Mapping TPM TIS with req_type = 0\n WARNING: CPU: 22 PID: 1 at arch/x86/mm/pat/memtype.c:530 memtype_reserve+0x2ab/0x460\n Modules linked in:\n CPU: 22 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W 6.16.0-rc7+ #2 VOLUNTARY\n Tainted: [W]=WARN\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/29/2025\n RIP: 0010:memtype_reserve+0x2ab/0x460\n __ioremap_caller+0x16d/0x3d0\n ioremap_cache+0x17/0x30\n x86_acpi_os_ioremap+0xe/0x20\n acpi_os_map_iomem+0x1f3/0x240\n acpi_os_map_memory+0xe/0x20\n acpi_ex_system_memory_space_handler+0x273/0x440\n acpi_ev_address_space_dispatch+0x176/0x4c0\n acpi_ex_access_region+0x2ad/0x530\n acpi_ex_field_datum_io+0xa2/0x4f0\n acpi_ex_extract_from_field+0x296/0x3e0\n acpi_ex_read_data_from_field+0xd1/0x460\n acpi_ex_resolve_node_to_value+0x2ee/0x530\n acpi_ex_resolve_to_value+0x1f2/0x540\n acpi_ds_evaluate_name_path+0x11b/0x190\n acpi_ds_exec_end_op+0x456/0x960\n acpi_ps_parse_loop+0x27a/0xa50\n acpi_ps_parse_aml+0x226/0x600\n acpi_ps_execute_method+0x172/0x3e0\n acpi_ns_evaluate+0x175/0x5f0\n acpi_evaluate_object+0x213/0x490\n acpi_evaluate_integer+0x6d/0x140\n acpi_bus_get_status+0x93/0x150\n acpi_add_single_object+0x43a/0x7c0\n acpi_bus_check_add+0x149/0x3a0\n acpi_bus_check_add_1+0x16/0x30\n acpi_ns_walk_namespace+0x22c/0x360\n acpi_walk_namespace+0x15c/0x170\n acpi_bus_scan+0x1dd/0x200\n acpi_scan_init+0xe5/0x2b0\n acpi_init+0x264/0x5b0\n do_one_i\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40181",
"url": "https://www.suse.com/security/cve/CVE-2025-40181"
},
{
"category": "external",
"summary": "SUSE Bug 1253471 for CVE-2025-40181",
"url": "https://bugzilla.suse.com/1253471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40181"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix IPsec cleanup over MPV device\n\nWhen we do mlx5e_detach_netdev() we eventually disable blocking events\nnotifier, among those events are IPsec MPV events from IB to core.\n\nSo before disabling those blocking events, make sure to also unregister\nthe devcom device and mark all this device operations as complete,\nin order to prevent the other device from using invalid netdev\nduring future devcom events which could cause the trace below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000010\nPGD 146427067 P4D 146427067 PUD 146488067 PMD 0\nOops: Oops: 0000 [#1] SMP\nCPU: 1 UID: 0 PID: 7735 Comm: devlink Tainted: GW 6.12.0-rc6_for_upstream_min_debug_2024_11_08_00_46 #1\nTainted: [W]=WARN\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]\nCode: 00 01 48 83 05 23 32 1e 00 01 41 b8 ed ff ff ff e9 60 ff ff ff 48 83 05 00 32 1e 00 01 eb e3 66 0f 1f 44 00 00 0f 1f 44 00 00 \u003c48\u003e 8b 47 10 48 83 05 5f 32 1e 00 01 48 8b 50 40 48 85 d2 74 05 40\nRSP: 0018:ffff88811a5c35f8 EFLAGS: 00010206\nRAX: ffff888106e8ab80 RBX: ffff888107d7e200 RCX: ffff88810d6f0a00\nRDX: ffff88810d6f0a00 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffff88811a17e620 R08: 0000000000000040 R09: 0000000000000000\nR10: ffff88811a5c3618 R11: 0000000de85d51bd R12: ffff88811a17e600\nR13: ffff88810d6f0a00 R14: 0000000000000000 R15: ffff8881034bda80\nFS: 00007f27bdf89180(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000010 CR3: 000000010f159005 CR4: 0000000000372eb0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x60\n ? page_fault_oops+0x150/0x3e0\n ? exc_page_fault+0x74/0x130\n ? asm_exc_page_fault+0x22/0x30\n ? mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]\n mlx5e_devcom_event_mpv+0x42/0x60 [mlx5_core]\n mlx5_devcom_send_event+0x8c/0x170 [mlx5_core]\n blocking_event+0x17b/0x230 [mlx5_core]\n notifier_call_chain+0x35/0xa0\n blocking_notifier_call_chain+0x3d/0x60\n mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]\n mlx5_core_mp_event_replay+0x12/0x20 [mlx5_core]\n mlx5_ib_bind_slave_port+0x228/0x2c0 [mlx5_ib]\n mlx5_ib_stage_init_init+0x664/0x9d0 [mlx5_ib]\n ? idr_alloc_cyclic+0x50/0xb0\n ? __kmalloc_cache_noprof+0x167/0x340\n ? __kmalloc_noprof+0x1a7/0x430\n __mlx5_ib_add+0x34/0xd0 [mlx5_ib]\n mlx5r_probe+0xe9/0x310 [mlx5_ib]\n ? kernfs_add_one+0x107/0x150\n ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]\n auxiliary_bus_probe+0x3e/0x90\n really_probe+0xc5/0x3a0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x86/0xa0\n device_add+0x62d/0x830\n __auxiliary_device_add+0x3b/0xa0\n ? auxiliary_device_init+0x41/0x90\n add_adev+0xd1/0x150 [mlx5_core]\n mlx5_rescan_drivers_locked+0x21c/0x300 [mlx5_core]\n esw_mode_change+0x6c/0xc0 [mlx5_core]\n mlx5_devlink_eswitch_mode_set+0x21e/0x640 [mlx5_core]\n devlink_nl_eswitch_set_doit+0x60/0xe0\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x180/0x2b0\n ? devlink_get_from_attrs_lock+0x170/0x170\n ? devlink_nl_eswitch_get_doit+0x290/0x290\n ? devlink_nl_pre_doit_port_optional+0x50/0x50\n ? genl_family_rcv_msg_dumpit+0xf0/0xf0\n netlink_rcv_skb+0x54/0x100\n genl_rcv+0x24/0x40\n netlink_unicast+0x1fc/0x2d0\n netlink_sendmsg+0x1e4/0x410\n __sock_sendmsg+0x38/0x60\n ? sockfd_lookup_light+0x12/0x60\n __sys_sendto+0x105/0x160\n ? __sys_recvmsg+0x4e/0x90\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x4c/0x100\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7f27bc91b13a\nCode: bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fa 96 2c 00 45 89 c9 4c 63 d1 48 63 ff 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40238",
"url": "https://www.suse.com/security/cve/CVE-2025-40238"
},
{
"category": "external",
"summary": "SUSE Bug 1254871 for CVE-2025-40238",
"url": "https://bugzilla.suse.com/1254871"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40238"
},
{
"cve": "CVE-2025-40254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: remove never-working support for setting nsh fields\n\nThe validation of the set(nsh(...)) action is completely wrong.\nIt runs through the nsh_key_put_from_nlattr() function that is the\nsame function that validates NSH keys for the flow match and the\npush_nsh() action. However, the set(nsh(...)) has a very different\nmemory layout. Nested attributes in there are doubled in size in\ncase of the masked set(). That makes proper validation impossible.\n\nThere is also confusion in the code between the \u0027masked\u0027 flag, that\nsays that the nested attributes are doubled in size containing both\nthe value and the mask, and the \u0027is_mask\u0027 that says that the value\nwe\u0027re parsing is the mask. This is causing kernel crash on trying to\nwrite into mask part of the match with SW_FLOW_KEY_PUT() during\nvalidation, while validate_nsh() doesn\u0027t allocate any memory for it:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 1c2383067 P4D 1c2383067 PUD 20b703067 PMD 0\n Oops: Oops: 0000 [#1] SMP NOPTI\n CPU: 8 UID: 0 Kdump: loaded Not tainted 6.17.0-rc4+ #107 PREEMPT(voluntary)\n RIP: 0010:nsh_key_put_from_nlattr+0x19d/0x610 [openvswitch]\n Call Trace:\n \u003cTASK\u003e\n validate_nsh+0x60/0x90 [openvswitch]\n validate_set.constprop.0+0x270/0x3c0 [openvswitch]\n __ovs_nla_copy_actions+0x477/0x860 [openvswitch]\n ovs_nla_copy_actions+0x8d/0x100 [openvswitch]\n ovs_packet_cmd_execute+0x1cc/0x310 [openvswitch]\n genl_family_rcv_msg_doit+0xdb/0x130\n genl_family_rcv_msg+0x14b/0x220\n genl_rcv_msg+0x47/0xa0\n netlink_rcv_skb+0x53/0x100\n genl_rcv+0x24/0x40\n netlink_unicast+0x280/0x3b0\n netlink_sendmsg+0x1f7/0x430\n ____sys_sendmsg+0x36b/0x3a0\n ___sys_sendmsg+0x87/0xd0\n __sys_sendmsg+0x6d/0xd0\n do_syscall_64+0x7b/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe third issue with this process is that while trying to convert\nthe non-masked set into masked one, validate_set() copies and doubles\nthe size of the OVS_KEY_ATTR_NSH as if it didn\u0027t have any nested\nattributes. It should be copying each nested attribute and doubling\nthem in size independently. And the process must be properly reversed\nduring the conversion back from masked to a non-masked variant during\nthe flow dump.\n\nIn the end, the only two outcomes of trying to use this action are\neither validation failure or a kernel crash. And if somehow someone\nmanages to install a flow with such an action, it will most definitely\nnot do what it is supposed to, since all the keys and the masks are\nmixed up.\n\nFixing all the issues is a complex task as it requires re-writing\nmost of the validation code.\n\nGiven that and the fact that this functionality never worked since\nintroduction, let\u0027s just remove it altogether. It\u0027s better to\nre-introduce it later with a proper implementation instead of trying\nto fix it in stable releases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40254",
"url": "https://www.suse.com/security/cve/CVE-2025-40254"
},
{
"category": "external",
"summary": "SUSE Bug 1254852 for CVE-2025-40254",
"url": "https://bugzilla.suse.com/1254852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40254"
},
{
"cve": "CVE-2025-40257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40257"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix a race in mptcp_pm_del_add_timer()\n\nmptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, \u0026entry-\u003eadd_timer)\nwhile another might have free entry already, as reported by syzbot.\n\nAdd RCU protection to fix this issue.\n\nAlso change confusing add_timer variable with stop_timer boolean.\n\nsyzbot report:\n\nBUG: KASAN: slab-use-after-free in __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616\nRead of size 4 at addr ffff8880311e4150 by task kworker/1:1/44\n\nCPU: 1 UID: 0 PID: 44 Comm: kworker/1:1 Not tainted syzkaller #0 PREEMPT_{RT,(full)}\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025\nWorkqueue: events mptcp_worker\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616\n sk_stop_timer_sync+0x1b/0x90 net/core/sock.c:3631\n mptcp_pm_del_add_timer+0x283/0x310 net/mptcp/pm.c:362\n mptcp_incoming_options+0x1357/0x1f60 net/mptcp/options.c:1174\n tcp_data_queue+0xca/0x6450 net/ipv4/tcp_input.c:5361\n tcp_rcv_established+0x1335/0x2670 net/ipv4/tcp_input.c:6441\n tcp_v4_do_rcv+0x98b/0xbf0 net/ipv4/tcp_ipv4.c:1931\n tcp_v4_rcv+0x252a/0x2dc0 net/ipv4/tcp_ipv4.c:2374\n ip_protocol_deliver_rcu+0x221/0x440 net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:239\n NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318\n NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318\n __netif_receive_skb_one_core net/core/dev.c:6079 [inline]\n __netif_receive_skb+0x143/0x380 net/core/dev.c:6192\n process_backlog+0x31e/0x900 net/core/dev.c:6544\n __napi_poll+0xb6/0x540 net/core/dev.c:7594\n napi_poll net/core/dev.c:7657 [inline]\n net_rx_action+0x5f7/0xda0 net/core/dev.c:7784\n handle_softirqs+0x22f/0x710 kernel/softirq.c:622\n __do_softirq kernel/softirq.c:656 [inline]\n __local_bh_enable_ip+0x1a0/0x2e0 kernel/softirq.c:302\n mptcp_pm_send_ack net/mptcp/pm.c:210 [inline]\n mptcp_pm_addr_send_ack+0x41f/0x500 net/mptcp/pm.c:-1\n mptcp_pm_worker+0x174/0x320 net/mptcp/pm.c:1002\n mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762\n process_one_work kernel/workqueue.c:3263 [inline]\n process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \u003c/TASK\u003e\n\nAllocated by task 44:\n kasan_save_stack mm/kasan/common.c:56 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:77\n poison_kmalloc_redzone mm/kasan/common.c:400 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417\n kasan_kmalloc include/linux/kasan.h:262 [inline]\n __kmalloc_cache_noprof+0x1ef/0x6c0 mm/slub.c:5748\n kmalloc_noprof include/linux/slab.h:957 [inline]\n mptcp_pm_alloc_anno_list+0x104/0x460 net/mptcp/pm.c:385\n mptcp_pm_create_subflow_or_signal_addr+0xf9d/0x1360 net/mptcp/pm_kernel.c:355\n mptcp_pm_nl_fully_established net/mptcp/pm_kernel.c:409 [inline]\n __mptcp_pm_kernel_worker+0x417/0x1ef0 net/mptcp/pm_kernel.c:1529\n mptcp_pm_worker+0x1ee/0x320 net/mptcp/pm.c:1008\n mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762\n process_one_work kernel/workqueue.c:3263 [inline]\n process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n\nFreed by task 6630:\n kasan_save_stack mm/kasan/common.c:56 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:77\n __kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:587\n kasan_save_free_info mm/kasan/kasan.h:406 [inline]\n poison_slab_object m\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40257",
"url": "https://www.suse.com/security/cve/CVE-2025-40257"
},
{
"category": "external",
"summary": "SUSE Bug 1254842 for CVE-2025-40257",
"url": "https://bugzilla.suse.com/1254842"
},
{
"category": "external",
"summary": "SUSE Bug 1257242 for CVE-2025-40257",
"url": "https://bugzilla.suse.com/1257242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-40257"
},
{
"cve": "CVE-2025-40259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40259"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Do not sleep in atomic context\n\nsg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may\nsleep. Hence, call sg_finish_rem_req() with interrupts enabled instead\nof disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40259",
"url": "https://www.suse.com/security/cve/CVE-2025-40259"
},
{
"category": "external",
"summary": "SUSE Bug 1254845 for CVE-2025-40259",
"url": "https://bugzilla.suse.com/1254845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40259"
},
{
"cve": "CVE-2025-40261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl()\n\nnvme_fc_delete_assocation() waits for pending I/O to complete before\nreturning, and an error can cause -\u003eioerr_work to be queued after\ncancel_work_sync() had been called. Move the call to cancel_work_sync() to\nbe after nvme_fc_delete_association() to ensure -\u003eioerr_work is not running\nwhen the nvme_fc_ctrl object is freed. Otherwise the following can occur:\n\n[ 1135.911754] list_del corruption, ff2d24c8093f31f8-\u003enext is NULL\n[ 1135.917705] ------------[ cut here ]------------\n[ 1135.922336] kernel BUG at lib/list_debug.c:52!\n[ 1135.926784] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 1135.931851] CPU: 48 UID: 0 PID: 726 Comm: kworker/u449:23 Kdump: loaded Not tainted 6.12.0 #1 PREEMPT(voluntary)\n[ 1135.943490] Hardware name: Dell Inc. PowerEdge R660/0HGTK9, BIOS 2.5.4 01/16/2025\n[ 1135.950969] Workqueue: 0x0 (nvme-wq)\n[ 1135.954673] RIP: 0010:__list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1135.961041] Code: c7 c7 98 68 72 94 e8 26 45 fe ff 0f 0b 48 c7 c7 70 68 72 94 e8 18 45 fe ff 0f 0b 48 89 fe 48 c7 c7 80 69 72 94 e8 07 45 fe ff \u003c0f\u003e 0b 48 89 d1 48 c7 c7 a0 6a 72 94 48 89 c2 e8 f3 44 fe ff 0f 0b\n[ 1135.979788] RSP: 0018:ff579b19482d3e50 EFLAGS: 00010046\n[ 1135.985015] RAX: 0000000000000033 RBX: ff2d24c8093f31f0 RCX: 0000000000000000\n[ 1135.992148] RDX: 0000000000000000 RSI: ff2d24d6bfa1d0c0 RDI: ff2d24d6bfa1d0c0\n[ 1135.999278] RBP: ff2d24c8093f31f8 R08: 0000000000000000 R09: ffffffff951e2b08\n[ 1136.006413] R10: ffffffff95122ac8 R11: 0000000000000003 R12: ff2d24c78697c100\n[ 1136.013546] R13: fffffffffffffff8 R14: 0000000000000000 R15: ff2d24c78697c0c0\n[ 1136.020677] FS: 0000000000000000(0000) GS:ff2d24d6bfa00000(0000) knlGS:0000000000000000\n[ 1136.028765] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1136.034510] CR2: 00007fd207f90b80 CR3: 000000163ea22003 CR4: 0000000000f73ef0\n[ 1136.041641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1136.048776] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 1136.055910] PKRU: 55555554\n[ 1136.058623] Call Trace:\n[ 1136.061074] \u003cTASK\u003e\n[ 1136.063179] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.067540] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.071898] ? move_linked_works+0x4a/0xa0\n[ 1136.075998] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.081744] ? __die_body.cold+0x8/0x12\n[ 1136.085584] ? die+0x2e/0x50\n[ 1136.088469] ? do_trap+0xca/0x110\n[ 1136.091789] ? do_error_trap+0x65/0x80\n[ 1136.095543] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.101289] ? exc_invalid_op+0x50/0x70\n[ 1136.105127] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.110874] ? asm_exc_invalid_op+0x1a/0x20\n[ 1136.115059] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.120806] move_linked_works+0x4a/0xa0\n[ 1136.124733] worker_thread+0x216/0x3a0\n[ 1136.128485] ? __pfx_worker_thread+0x10/0x10\n[ 1136.132758] kthread+0xfa/0x240\n[ 1136.135904] ? __pfx_kthread+0x10/0x10\n[ 1136.139657] ret_from_fork+0x31/0x50\n[ 1136.143236] ? __pfx_kthread+0x10/0x10\n[ 1136.146988] ret_from_fork_asm+0x1a/0x30\n[ 1136.150915] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40261",
"url": "https://www.suse.com/security/cve/CVE-2025-40261"
},
{
"category": "external",
"summary": "SUSE Bug 1254839 for CVE-2025-40261",
"url": "https://bugzilla.suse.com/1254839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40261"
},
{
"cve": "CVE-2025-40264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: pass wrb_params in case of OS2BMC\n\nbe_insert_vlan_in_pkt() is called with the wrb_params argument being NULL\nat be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL\npointer when processing a workaround for specific packet, as commit\nbc0c3405abbb (\"be2net: fix a Tx stall bug caused by a specific ipv6\npacket\") states.\n\nThe correct way would be to pass the wrb_params from be_xmit().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40264",
"url": "https://www.suse.com/security/cve/CVE-2025-40264"
},
{
"category": "external",
"summary": "SUSE Bug 1254835 for CVE-2025-40264",
"url": "https://bugzilla.suse.com/1254835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40264"
},
{
"cve": "CVE-2025-40328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_close_cached_fid()\n\nfind_or_create_cached_dir() could grab a new reference after kref_put()\nhad seen the refcount drop to zero but before cfid_list_lock is acquired\nin smb2_close_cached_fid(), leading to use-after-free.\n\nSwitch to kref_put_lock() so cfid_release() is called with\ncfid_list_lock held, closing that gap.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40328",
"url": "https://www.suse.com/security/cve/CVE-2025-40328"
},
{
"category": "external",
"summary": "SUSE Bug 1254624 for CVE-2025-40328",
"url": "https://bugzilla.suse.com/1254624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40328"
},
{
"cve": "CVE-2025-40350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40350"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ\n\nXDP programs can change the layout of an xdp_buff through\nbpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver\ncannot assume the size of the linear data area nor fragments. Fix the\nbug in mlx5 by generating skb according to xdp_buff after XDP programs\nrun.\n\nCurrently, when handling multi-buf XDP, the mlx5 driver assumes the\nlayout of an xdp_buff to be unchanged. That is, the linear data area\ncontinues to be empty and fragments remain the same. This may cause\nthe driver to generate erroneous skb or triggering a kernel\nwarning. When an XDP program added linear data through\nbpf_xdp_adjust_head(), the linear data will be ignored as\nmlx5e_build_linear_skb() builds an skb without linear data and then\npull data from fragments to fill the linear data area. When an XDP\nprogram has shrunk the non-linear data through bpf_xdp_adjust_tail(),\nthe delta passed to __pskb_pull_tail() may exceed the actual nonlinear\ndata size and trigger the BUG_ON in it.\n\nTo fix the issue, first record the original number of fragments. If the\nnumber of fragments changes after the XDP program runs, rewind the end\nfragment pointer by the difference and recalculate the truesize. Then,\nbuild the skb with the linear data area matching the xdp_buff. Finally,\nonly pull data in if there is non-linear data and fill the linear part\nup to 256 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40350",
"url": "https://www.suse.com/security/cve/CVE-2025-40350"
},
{
"category": "external",
"summary": "SUSE Bug 1255260 for CVE-2025-40350",
"url": "https://bugzilla.suse.com/1255260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40350"
},
{
"cve": "CVE-2025-40355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsysfs: check visibility before changing group attribute ownership\n\nSince commit 0c17270f9b92 (\"net: sysfs: Implement is_visible for\nphys_(port_id, port_name, switch_id)\"), __dev_change_net_namespace() can\nhit WARN_ON() when trying to change owner of a file that isn\u0027t visible.\nSee the trace below:\n\n WARNING: CPU: 6 PID: 2938 at net/core/dev.c:12410 __dev_change_net_namespace+0xb89/0xc30\n CPU: 6 UID: 0 PID: 2938 Comm: incusd Not tainted 6.17.1-1-mainline #1 PREEMPT(full) 4b783b4a638669fb644857f484487d17cb45ed1f\n Hardware name: Framework Laptop 13 (AMD Ryzen 7040Series)/FRANMDCP07, BIOS 03.07 02/19/2025\n RIP: 0010:__dev_change_net_namespace+0xb89/0xc30\n [...]\n Call Trace:\n \u003cTASK\u003e\n ? if6_seq_show+0x30/0x50\n do_setlink.isra.0+0xc7/0x1270\n ? __nla_validate_parse+0x5c/0xcc0\n ? security_capable+0x94/0x1a0\n rtnl_newlink+0x858/0xc20\n ? update_curr+0x8e/0x1c0\n ? update_entity_lag+0x71/0x80\n ? sched_balance_newidle+0x358/0x450\n ? psi_task_switch+0x113/0x2a0\n ? __pfx_rtnl_newlink+0x10/0x10\n rtnetlink_rcv_msg+0x346/0x3e0\n ? sched_clock+0x10/0x30\n ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x59/0x110\n netlink_unicast+0x285/0x3c0\n ? __alloc_skb+0xdb/0x1a0\n netlink_sendmsg+0x20d/0x430\n ____sys_sendmsg+0x39f/0x3d0\n ? import_iovec+0x2f/0x40\n ___sys_sendmsg+0x99/0xe0\n __sys_sendmsg+0x8a/0xf0\n do_syscall_64+0x81/0x970\n ? __sys_bind+0xe3/0x110\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? sock_alloc_file+0x63/0xc0\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? alloc_fd+0x12e/0x190\n ? put_unused_fd+0x2a/0x70\n ? do_sys_openat2+0xa2/0xe0\n ? syscall_exit_work+0x143/0x1b0\n ? do_syscall_64+0x244/0x970\n ? exc_page_fault+0x7e/0x1a0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [...]\n \u003c/TASK\u003e\n\nFix this by checking is_visible() before trying to touch the attribute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40355",
"url": "https://www.suse.com/security/cve/CVE-2025-40355"
},
{
"category": "external",
"summary": "SUSE Bug 1255261 for CVE-2025-40355",
"url": "https://bugzilla.suse.com/1255261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-40355"
},
{
"cve": "CVE-2025-40363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: fix field-spanning memcpy warning in AH output\n\nFix field-spanning memcpy warnings in ah6_output() and\nah6_output_done() where extension headers are copied to/from IPv6\naddress fields, triggering fortify-string warnings about writes beyond\nthe 16-byte address fields.\n\n memcpy: detected field-spanning write (size 40) of single field \"\u0026top_iph-\u003esaddr\" at net/ipv6/ah6.c:439 (size 16)\n WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439\n\nThe warnings are false positives as the extension headers are\nintentionally placed after the IPv6 header in memory. Fix by properly\ncopying addresses and extension headers separately, and introduce\nhelper functions to avoid code duplication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40363",
"url": "https://www.suse.com/security/cve/CVE-2025-40363"
},
{
"category": "external",
"summary": "SUSE Bug 1255102 for CVE-2025-40363",
"url": "https://bugzilla.suse.com/1255102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2025-40363"
},
{
"cve": "CVE-2025-68171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Ensure XFD state on signal delivery\n\nSean reported [1] the following splat when running KVM tests:\n\n WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70\n Call Trace:\n \u003cTASK\u003e\n fpu__clear_user_states+0x9c/0x100\n arch_do_signal_or_restart+0x142/0x210\n exit_to_user_mode_loop+0x55/0x100\n do_syscall_64+0x205/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nChao further identified [2] a reproducible scenario involving signal\ndelivery: a non-AMX task is preempted by an AMX-enabled task which\nmodifies the XFD MSR.\n\nWhen the non-AMX task resumes and reloads XSTATE with init values,\na warning is triggered due to a mismatch between fpstate::xfd and the\nCPU\u0027s current XFD state. fpu__clear_user_states() does not currently\nre-synchronize the XFD state after such preemption.\n\nInvoke xfd_update_state() which detects and corrects the mismatch if\nthere is a dynamic feature.\n\nThis also benefits the sigreturn path, as fpu__restore_sig() may call\nfpu__clear_user_states() when the sigframe is inaccessible.\n\n[ dhansen: minor changelog munging ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68171",
"url": "https://www.suse.com/security/cve/CVE-2025-68171"
},
{
"category": "external",
"summary": "SUSE Bug 1255255 for CVE-2025-68171",
"url": "https://bugzilla.suse.com/1255255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68171"
},
{
"cve": "CVE-2025-68174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68174"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: enhance kfd process check in switch partition\n\ncurrent switch partition only check if kfd_processes_table is empty.\nkfd_prcesses_table entry is deleted in kfd_process_notifier_release, but\nkfd_process tear down is in kfd_process_wq_release.\n\nconsider two processes:\n\nProcess A (workqueue) -\u003e kfd_process_wq_release -\u003e Access kfd_node member\nProcess B switch partition -\u003e amdgpu_xcp_pre_partition_switch -\u003e amdgpu_amdkfd_device_fini_sw\n-\u003e kfd_node tear down.\n\nProcess A and B may trigger a race as shown in dmesg log.\n\nThis patch is to resolve the race by adding an atomic kfd_process counter\nkfd_processes_count, it increment as create kfd process, decrement as\nfinish kfd_process_wq_release.\n\nv2: Put kfd_processes_count per kfd_dev, move decrement to kfd_process_destroy_pdds\nand bug fix. (Philip Yang)\n\n[3966658.307702] divide error: 0000 [#1] SMP NOPTI\n[3966658.350818] i10nm_edac\n[3966658.356318] CPU: 124 PID: 38435 Comm: kworker/124:0 Kdump: loaded Tainted\n[3966658.356890] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]\n[3966658.362839] nfit\n[3966658.366457] RIP: 0010:kfd_get_num_sdma_engines+0x17/0x40 [amdgpu]\n[3966658.366460] Code: 00 00 e9 ac 81 02 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 48 8b 4f 08 48 8b b7 00 01 00 00 8b 81 58 26 03 00 99 \u003cf7\u003e be b8 01 00 00 80 b9 70 2e 00 00 00 74 0b 83 f8 02 ba 02 00 00\n[3966658.380967] x86_pkg_temp_thermal\n[3966658.391529] RSP: 0018:ffffc900a0edfdd8 EFLAGS: 00010246\n[3966658.391531] RAX: 0000000000000008 RBX: ffff8974e593b800 RCX: ffff888645900000\n[3966658.391531] RDX: 0000000000000000 RSI: ffff888129154400 RDI: ffff888129151c00\n[3966658.391532] RBP: ffff8883ad79d400 R08: 0000000000000000 R09: ffff8890d2750af4\n[3966658.391532] R10: 0000000000000018 R11: 0000000000000018 R12: 0000000000000000\n[3966658.391533] R13: ffff8883ad79d400 R14: ffffe87ff662ba00 R15: ffff8974e593b800\n[3966658.391533] FS: 0000000000000000(0000) GS:ffff88fe7f600000(0000) knlGS:0000000000000000\n[3966658.391534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[3966658.391534] CR2: 0000000000d71000 CR3: 000000dd0e970004 CR4: 0000000002770ee0\n[3966658.391535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[3966658.391535] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[3966658.391536] PKRU: 55555554\n[3966658.391536] Call Trace:\n[3966658.391674] deallocate_sdma_queue+0x38/0xa0 [amdgpu]\n[3966658.391762] process_termination_cpsch+0x1ed/0x480 [amdgpu]\n[3966658.399754] intel_powerclamp\n[3966658.402831] kfd_process_dequeue_from_all_devices+0x5b/0xc0 [amdgpu]\n[3966658.402908] kfd_process_wq_release+0x1a/0x1a0 [amdgpu]\n[3966658.410516] coretemp\n[3966658.434016] process_one_work+0x1ad/0x380\n[3966658.434021] worker_thread+0x49/0x310\n[3966658.438963] kvm_intel\n[3966658.446041] ? process_one_work+0x380/0x380\n[3966658.446045] kthread+0x118/0x140\n[3966658.446047] ? __kthread_bind_mask+0x60/0x60\n[3966658.446050] ret_from_fork+0x1f/0x30\n[3966658.446053] Modules linked in: kpatch_20765354(OEK)\n[3966658.455310] kvm\n[3966658.464534] mptcp_diag xsk_diag raw_diag unix_diag af_packet_diag netlink_diag udp_diag act_pedit act_mirred act_vlan cls_flower kpatch_21951273(OEK) kpatch_18424469(OEK) kpatch_19749756(OEK)\n[3966658.473462] idxd_mdev\n[3966658.482306] kpatch_17971294(OEK) sch_ingress xt_conntrack amdgpu(OE) amdxcp(OE) amddrm_buddy(OE) amd_sched(OE) amdttm(OE) amdkcl(OE) intel_ifs iptable_mangle tcm_loop target_core_pscsi tcp_diag target_core_file inet_diag target_core_iblock target_core_user target_core_mod coldpgs kpatch_18383292(OEK) ip6table_nat ip6table_filter ip6_tables ip_set_hash_ipportip ip_set_hash_ipportnet ip_set_hash_ipport ip_set_bitmap_port xt_comment iptable_nat nf_nat iptable_filter ip_tables ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sn_core_odd(OE) i40e overlay binfmt_misc tun bonding(OE) aisqos(OE) aisqo\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68174",
"url": "https://www.suse.com/security/cve/CVE-2025-68174"
},
{
"category": "external",
"summary": "SUSE Bug 1255327 for CVE-2025-68174",
"url": "https://bugzilla.suse.com/1255327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68174"
},
{
"cve": "CVE-2025-68178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix possible deadlock while configuring policy\n\nFollowing deadlock can be triggered easily by lockdep:\n\nWARNING: possible circular locking dependency detected\n6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted\n------------------------------------------------------\ncheck/1334 is trying to acquire lock:\nff1100011d9d0678 (\u0026q-\u003esysfs_lock){+.+.}-{4:4}, at: blk_unregister_queue+0x53/0x180\n\nbut task is already holding lock:\nff1100011d9d00e0 (\u0026q-\u003eq_usage_counter(queue)#3){++++}-{0:0}, at: del_gendisk+0xba/0x110\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #2 (\u0026q-\u003eq_usage_counter(queue)#3){++++}-{0:0}:\n blk_queue_enter+0x40b/0x470\n blkg_conf_prep+0x7b/0x3c0\n tg_set_limit+0x10a/0x3e0\n cgroup_file_write+0xc6/0x420\n kernfs_fop_write_iter+0x189/0x280\n vfs_write+0x256/0x490\n ksys_write+0x83/0x190\n __x64_sys_write+0x21/0x30\n x64_sys_call+0x4608/0x4630\n do_syscall_64+0xdb/0x6b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n-\u003e #1 (\u0026q-\u003erq_qos_mutex){+.+.}-{4:4}:\n __mutex_lock+0xd8/0xf50\n mutex_lock_nested+0x2b/0x40\n wbt_init+0x17e/0x280\n wbt_enable_default+0xe9/0x140\n blk_register_queue+0x1da/0x2e0\n __add_disk+0x38c/0x5d0\n add_disk_fwnode+0x89/0x250\n device_add_disk+0x18/0x30\n virtblk_probe+0x13a3/0x1800\n virtio_dev_probe+0x389/0x610\n really_probe+0x136/0x620\n __driver_probe_device+0xb3/0x230\n driver_probe_device+0x2f/0xe0\n __driver_attach+0x158/0x250\n bus_for_each_dev+0xa9/0x130\n driver_attach+0x26/0x40\n bus_add_driver+0x178/0x3d0\n driver_register+0x7d/0x1c0\n __register_virtio_driver+0x2c/0x60\n virtio_blk_init+0x6f/0xe0\n do_one_initcall+0x94/0x540\n kernel_init_freeable+0x56a/0x7b0\n kernel_init+0x2b/0x270\n ret_from_fork+0x268/0x4c0\n ret_from_fork_asm+0x1a/0x30\n\n-\u003e #0 (\u0026q-\u003esysfs_lock){+.+.}-{4:4}:\n __lock_acquire+0x1835/0x2940\n lock_acquire+0xf9/0x450\n __mutex_lock+0xd8/0xf50\n mutex_lock_nested+0x2b/0x40\n blk_unregister_queue+0x53/0x180\n __del_gendisk+0x226/0x690\n del_gendisk+0xba/0x110\n sd_remove+0x49/0xb0 [sd_mod]\n device_remove+0x87/0xb0\n device_release_driver_internal+0x11e/0x230\n device_release_driver+0x1a/0x30\n bus_remove_device+0x14d/0x220\n device_del+0x1e1/0x5a0\n __scsi_remove_device+0x1ff/0x2f0\n scsi_remove_device+0x37/0x60\n sdev_store_delete+0x77/0x100\n dev_attr_store+0x1f/0x40\n sysfs_kf_write+0x65/0x90\n kernfs_fop_write_iter+0x189/0x280\n vfs_write+0x256/0x490\n ksys_write+0x83/0x190\n __x64_sys_write+0x21/0x30\n x64_sys_call+0x4608/0x4630\n do_syscall_64+0xdb/0x6b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nother info that might help us debug this:\n\nChain exists of:\n \u0026q-\u003esysfs_lock --\u003e \u0026q-\u003erq_qos_mutex --\u003e \u0026q-\u003eq_usage_counter(queue)#3\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026q-\u003eq_usage_counter(queue)#3);\n lock(\u0026q-\u003erq_qos_mutex);\n lock(\u0026q-\u003eq_usage_counter(queue)#3);\n lock(\u0026q-\u003esysfs_lock);\n\nRoot cause is that queue_usage_counter is grabbed with rq_qos_mutex\nheld in blkg_conf_prep(), while queue should be freezed before\nrq_qos_mutex from other context.\n\nThe blk_queue_enter() from blkg_conf_prep() is used to protect against\npolicy deactivation, which is already protected with blkcg_mutex, hence\nconvert blk_queue_enter() to blkcg_mutex to fix this problem. Meanwhile,\nconsider that blkcg_mutex is held after queue is freezed from policy\ndeactivation, also convert blkg_alloc() to use GFP_NOIO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68178",
"url": "https://www.suse.com/security/cve/CVE-2025-68178"
},
{
"category": "external",
"summary": "SUSE Bug 1255266 for CVE-2025-68178",
"url": "https://bugzilla.suse.com/1255266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68178"
},
{
"cve": "CVE-2025-68188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()\n\nUse RCU to avoid a pair of atomic operations and a potential\nUAF on dst_dev()-\u003eflags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68188",
"url": "https://www.suse.com/security/cve/CVE-2025-68188"
},
{
"category": "external",
"summary": "SUSE Bug 1255269 for CVE-2025-68188",
"url": "https://bugzilla.suse.com/1255269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68188"
},
{
"cve": "CVE-2025-68200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add bpf_prog_run_data_pointers()\n\nsyzbot found that cls_bpf_classify() is able to change\ntc_skb_cb(skb)-\u003edrop_reason triggering a warning in sk_skb_reason_drop().\n\nWARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline]\nWARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214\n\nstruct tc_skb_cb has been added in commit ec624fe740b4 (\"net/sched:\nExtend qdisc control block with tc control block\"), which added a wrong\ninteraction with db58ba459202 (\"bpf: wire in data and data_end for\ncls_act_bpf\").\n\ndrop_reason was added later.\n\nAdd bpf_prog_run_data_pointers() helper to save/restore the net_sched\nstorage colliding with BPF data_meta/data_end.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68200",
"url": "https://www.suse.com/security/cve/CVE-2025-68200"
},
{
"category": "external",
"summary": "SUSE Bug 1255241 for CVE-2025-68200",
"url": "https://bugzilla.suse.com/1255241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68200"
},
{
"cve": "CVE-2025-68215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix PTP cleanup on driver removal in error path\n\nImprove the cleanup on releasing PTP resources in error path.\nThe error case might happen either at the driver probe and PTP\nfeature initialization or on PTP restart (errors in reset handling, NVM\nupdate etc). In both cases, calls to PF PTP cleanup (ice_ptp_cleanup_pf\nfunction) and \u0027ps_lock\u0027 mutex deinitialization were missed.\nAdditionally, ptp clock was not unregistered in the latter case.\n\nKeep PTP state as \u0027uninitialized\u0027 on init to distinguish between error\nscenarios and to avoid resource release duplication at driver removal.\n\nThe consequence of missing ice_ptp_cleanup_pf call is the following call\ntrace dumped when ice_adapter object is freed (port list is not empty,\nas it is required at this stage):\n\n[ T93022] ------------[ cut here ]------------\n[ T93022] WARNING: CPU: 10 PID: 93022 at\nice/ice_adapter.c:67 ice_adapter_put+0xef/0x100 [ice]\n...\n[ T93022] RIP: 0010:ice_adapter_put+0xef/0x100 [ice]\n...\n[ T93022] Call Trace:\n[ T93022] \u003cTASK\u003e\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] ? __warn.cold+0xb0/0x10e\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] ? report_bug+0xd8/0x150\n[ T93022] ? handle_bug+0xe9/0x110\n[ T93022] ? exc_invalid_op+0x17/0x70\n[ T93022] ? asm_exc_invalid_op+0x1a/0x20\n[ T93022] ? ice_adapter_put+0xef/0x100 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n[ T93022] pci_device_remove+0x42/0xb0\n[ T93022] device_release_driver_internal+0x19f/0x200\n[ T93022] driver_detach+0x48/0x90\n[ T93022] bus_remove_driver+0x70/0xf0\n[ T93022] pci_unregister_driver+0x42/0xb0\n[ T93022] ice_module_exit+0x10/0xdb0 [ice\n33d2647ad4f6d866d41eefff1806df37c68aef0c]\n...\n[ T93022] ---[ end trace 0000000000000000 ]---\n[ T93022] ice: module unloaded",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68215",
"url": "https://www.suse.com/security/cve/CVE-2025-68215"
},
{
"category": "external",
"summary": "SUSE Bug 1255226 for CVE-2025-68215",
"url": "https://bugzilla.suse.com/1255226"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68215"
},
{
"cve": "CVE-2025-68227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68227"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Fix proto fallback detection with BPF\n\nThe sockmap feature allows bpf syscall from userspace, or based\non bpf sockops, replacing the sk_prot of sockets during protocol stack\nprocessing with sockmap\u0027s custom read/write interfaces.\n\u0027\u0027\u0027\ntcp_rcv_state_process()\n syn_recv_sock()/subflow_syn_recv_sock()\n tcp_init_transfer(BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB)\n bpf_skops_established \u003c== sockops\n bpf_sock_map_update(sk) \u003c== call bpf helper\n tcp_bpf_update_proto() \u003c== update sk_prot\n\u0027\u0027\u0027\n\nWhen the server has MPTCP enabled but the client sends a TCP SYN\nwithout MPTCP, subflow_syn_recv_sock() performs a fallback on the\nsubflow, replacing the subflow sk\u0027s sk_prot with the native sk_prot.\n\u0027\u0027\u0027\nsubflow_syn_recv_sock()\n subflow_ulp_fallback()\n subflow_drop_ctx()\n mptcp_subflow_ops_undo_override()\n\u0027\u0027\u0027\n\nThen, this subflow can be normally used by sockmap, which replaces the\nnative sk_prot with sockmap\u0027s custom sk_prot. The issue occurs when the\nuser executes accept::mptcp_stream_accept::mptcp_fallback_tcp_ops().\nHere, it uses sk-\u003esk_prot to compare with the native sk_prot, but this\nis incorrect when sockmap is used, as we may incorrectly set\nsk-\u003esk_socket-\u003eops.\n\nThis fix uses the more generic sk_family for the comparison instead.\n\nAdditionally, this also prevents a WARNING from occurring:\n\nresult from ./scripts/decode_stacktrace.sh:\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 337 at net/mptcp/protocol.c:68 mptcp_stream_accept \\\n(net/mptcp/protocol.c:4005)\nModules linked in:\n...\n\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\ndo_accept (net/socket.c:1989)\n__sys_accept4 (net/socket.c:2028 net/socket.c:2057)\n__x64_sys_accept (net/socket.c:2067)\nx64_sys_call (arch/x86/entry/syscall_64.c:41)\ndo_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\nRIP: 0033:0x7f87ac92b83d\n\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68227",
"url": "https://www.suse.com/security/cve/CVE-2025-68227"
},
{
"category": "external",
"summary": "SUSE Bug 1255216 for CVE-2025-68227",
"url": "https://bugzilla.suse.com/1255216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68227"
},
{
"cve": "CVE-2025-68241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68241"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe\n\nThe sit driver\u0027s packet transmission path calls: sit_tunnel_xmit() -\u003e\nupdate_or_create_fnhe(), which lead to fnhe_remove_oldest() being called\nto delete entries exceeding FNHE_RECLAIM_DEPTH+random.\n\nThe race window is between fnhe_remove_oldest() selecting fnheX for\ndeletion and the subsequent kfree_rcu(). During this time, the\nconcurrent path\u0027s __mkroute_output() -\u003e find_exception() can fetch the\nsoon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a\nnew dst using a dst_hold(). When the original fnheX is freed via RCU,\nthe dst reference remains permanently leaked.\n\nCPU 0 CPU 1\n__mkroute_output()\n find_exception() [fnheX]\n update_or_create_fnhe()\n fnhe_remove_oldest() [fnheX]\n rt_bind_exception() [bind dst]\n RCU callback [fnheX freed, dst leak]\n\nThis issue manifests as a device reference count leak and a warning in\ndmesg when unregistering the net device:\n\n unregister_netdevice: waiting for sitX to become free. Usage count = N\n\nIdo Schimmel provided the simple test validation method [1].\n\nThe fix clears \u0027oldest-\u003efnhe_daddr\u0027 before calling fnhe_flush_routes().\nSince rt_bind_exception() checks this field, setting it to zero prevents\nthe stale fnhe from being reused and bound to a new dst just before it\nis freed.\n\n[1]\nip netns add ns1\nip -n ns1 link set dev lo up\nip -n ns1 address add 192.0.2.1/32 dev lo\nip -n ns1 link add name dummy1 up type dummy\nip -n ns1 route add 192.0.2.2/32 dev dummy1\nip -n ns1 link add name gretap1 up arp off type gretap \\\n local 192.0.2.1 remote 192.0.2.2\nip -n ns1 route add 198.51.0.0/16 dev gretap1\ntaskset -c 0 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\ntaskset -c 2 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\nsleep 10\nip netns pids ns1 | xargs kill\nip netns del ns1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68241",
"url": "https://www.suse.com/security/cve/CVE-2025-68241"
},
{
"category": "external",
"summary": "SUSE Bug 1255157 for CVE-2025-68241",
"url": "https://bugzilla.suse.com/1255157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68241"
},
{
"cve": "CVE-2025-68245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: fix incorrect refcount handling causing incorrect cleanup\n\ncommit efa95b01da18 (\"netpoll: fix use after free\") incorrectly\nignored the refcount and prematurely set dev-\u003enpinfo to NULL during\nnetpoll cleanup, leading to improper behavior and memory leaks.\n\nScenario causing lack of proper cleanup:\n\n1) A netpoll is associated with a NIC (e.g., eth0) and netdev-\u003enpinfo is\n allocated, and refcnt = 1\n - Keep in mind that npinfo is shared among all netpoll instances. In\n this case, there is just one.\n\n2) Another netpoll is also associated with the same NIC and\n npinfo-\u003erefcnt += 1.\n - Now dev-\u003enpinfo-\u003erefcnt = 2;\n - There is just one npinfo associated to the netdev.\n\n3) When the first netpolls goes to clean up:\n - The first cleanup succeeds and clears np-\u003edev-\u003enpinfo, ignoring\n refcnt.\n - It basically calls `RCU_INIT_POINTER(np-\u003edev-\u003enpinfo, NULL);`\n - Set dev-\u003enpinfo = NULL, without proper cleanup\n - No -\u003endo_netpoll_cleanup() is either called\n\n4) Now the second target tries to clean up\n - The second cleanup fails because np-\u003edev-\u003enpinfo is already NULL.\n * In this case, ops-\u003endo_netpoll_cleanup() was never called, and\n the skb pool is not cleaned as well (for the second netpoll\n instance)\n - This leaks npinfo and skbpool skbs, which is clearly reported by\n kmemleak.\n\nRevert commit efa95b01da18 (\"netpoll: fix use after free\") and adds\nclarifying comments emphasizing that npinfo cleanup should only happen\nonce the refcount reaches zero, ensuring stable and correct netpoll\nbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68245",
"url": "https://www.suse.com/security/cve/CVE-2025-68245"
},
{
"category": "external",
"summary": "SUSE Bug 1255268 for CVE-2025-68245",
"url": "https://bugzilla.suse.com/1255268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68245"
},
{
"cve": "CVE-2025-68254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing\n\nThe Extended Supported Rates (ESR) IE handling in OnBeacon accessed\n*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these\noffsets lie within the received frame buffer. A malformed beacon with\nan ESR IE positioned at the end of the buffer could cause an\nout-of-bounds read, potentially triggering a kernel panic.\n\nAdd a boundary check to ensure that the ESR IE body and the subsequent\nbytes are within the limits of the frame before attempting to access\nthem.\n\nThis prevents OOB reads caused by malformed beacon frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68254",
"url": "https://www.suse.com/security/cve/CVE-2025-68254"
},
{
"category": "external",
"summary": "SUSE Bug 1255140 for CVE-2025-68254",
"url": "https://bugzilla.suse.com/1255140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68254"
},
{
"cve": "CVE-2025-68256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68256"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser\n\nThe Information Element (IE) parser rtw_get_ie() trusted the length\nbyte of each IE without validating that the IE body (len bytes after\nthe 2-byte header) fits inside the remaining frame buffer. A malformed\nframe can advertise an IE length larger than the available data, causing\nthe parser to increment its pointer beyond the buffer end. This results\nin out-of-bounds reads or, depending on the pattern, an infinite loop.\n\nFix by validating that (offset + 2 + len) does not exceed the limit\nbefore accepting the IE or advancing to the next element.\n\nThis prevents OOB reads and ensures the parser terminates safely on\nmalformed frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68256",
"url": "https://www.suse.com/security/cve/CVE-2025-68256"
},
{
"category": "external",
"summary": "SUSE Bug 1255138 for CVE-2025-68256",
"url": "https://bugzilla.suse.com/1255138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68256"
},
{
"cve": "CVE-2025-68261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n \u003cTASK\u003e\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68261",
"url": "https://www.suse.com/security/cve/CVE-2025-68261"
},
{
"category": "external",
"summary": "SUSE Bug 1255164 for CVE-2025-68261",
"url": "https://bugzilla.suse.com/1255164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68261"
},
{
"cve": "CVE-2025-68284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: prevent potential out-of-bounds writes in handle_auth_session_key()\n\nThe len field originates from untrusted network packets. Boundary\nchecks have been added to prevent potential out-of-bounds writes when\ndecrypting the connection secret or processing service tickets.\n\n[ idryomov: changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68284",
"url": "https://www.suse.com/security/cve/CVE-2025-68284"
},
{
"category": "external",
"summary": "SUSE Bug 1255377 for CVE-2025-68284",
"url": "https://bugzilla.suse.com/1255377"
},
{
"category": "external",
"summary": "SUSE Bug 1255378 for CVE-2025-68284",
"url": "https://bugzilla.suse.com/1255378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-68284"
},
{
"cve": "CVE-2025-68285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68285"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix potential use-after-free in have_mon_and_osd_map()\n\nThe wait loop in __ceph_open_session() can race with the client\nreceiving a new monmap or osdmap shortly after the initial map is\nreceived. Both ceph_monc_handle_map() and handle_one_map() install\na new map immediately after freeing the old one\n\n kfree(monc-\u003emonmap);\n monc-\u003emonmap = monmap;\n\n ceph_osdmap_destroy(osdc-\u003eosdmap);\n osdc-\u003eosdmap = newmap;\n\nunder client-\u003emonc.mutex and client-\u003eosdc.lock respectively, but\nbecause neither is taken in have_mon_and_osd_map() it\u0027s possible for\nclient-\u003emonc.monmap-\u003eepoch and client-\u003eosdc.osdmap-\u003eepoch arms in\n\n client-\u003emonc.monmap \u0026\u0026 client-\u003emonc.monmap-\u003eepoch \u0026\u0026\n client-\u003eosdc.osdmap \u0026\u0026 client-\u003eosdc.osdmap-\u003eepoch;\n\ncondition to dereference an already freed map. This happens to be\nreproducible with generic/395 and generic/397 with KASAN enabled:\n\n BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70\n Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305\n CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266\n ...\n Call Trace:\n \u003cTASK\u003e\n have_mon_and_osd_map+0x56/0x70\n ceph_open_session+0x182/0x290\n ceph_get_tree+0x333/0x680\n vfs_get_tree+0x49/0x180\n do_new_mount+0x1a3/0x2d0\n path_mount+0x6dd/0x730\n do_mount+0x99/0xe0\n __do_sys_mount+0x141/0x180\n do_syscall_64+0x9f/0x100\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\n Allocated by task 13305:\n ceph_osdmap_alloc+0x16/0x130\n ceph_osdc_init+0x27a/0x4c0\n ceph_create_client+0x153/0x190\n create_fs_client+0x50/0x2a0\n ceph_get_tree+0xff/0x680\n vfs_get_tree+0x49/0x180\n do_new_mount+0x1a3/0x2d0\n path_mount+0x6dd/0x730\n do_mount+0x99/0xe0\n __do_sys_mount+0x141/0x180\n do_syscall_64+0x9f/0x100\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n Freed by task 9475:\n kfree+0x212/0x290\n handle_one_map+0x23c/0x3b0\n ceph_osdc_handle_map+0x3c9/0x590\n mon_dispatch+0x655/0x6f0\n ceph_con_process_message+0xc3/0xe0\n ceph_con_v1_try_read+0x614/0x760\n ceph_con_workfn+0x2de/0x650\n process_one_work+0x486/0x7c0\n process_scheduled_works+0x73/0x90\n worker_thread+0x1c8/0x2a0\n kthread+0x2ec/0x300\n ret_from_fork+0x24/0x40\n ret_from_fork_asm+0x1a/0x30\n\nRewrite the wait loop to check the above condition directly with\nclient-\u003emonc.mutex and client-\u003eosdc.lock taken as appropriate. While\nat it, improve the timeout handling (previously mount_timeout could be\nexceeded in case wait_event_interruptible_timeout() slept more than\nonce) and access client-\u003eauth_err under client-\u003emonc.mutex to match\nhow it\u0027s set in finish_auth().\n\nmonmap_show() and osdmap_show() now take the respective lock before\naccessing the map as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68285",
"url": "https://www.suse.com/security/cve/CVE-2025-68285"
},
{
"category": "external",
"summary": "SUSE Bug 1255401 for CVE-2025-68285",
"url": "https://bugzilla.suse.com/1255401"
},
{
"category": "external",
"summary": "SUSE Bug 1255402 for CVE-2025-68285",
"url": "https://bugzilla.suse.com/1255402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-68285"
},
{
"cve": "CVE-2025-68296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68296"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup\n\nProtect vga_switcheroo_client_fb_set() with console lock. Avoids OOB\naccess in fbcon_remap_all(). Without holding the console lock the call\nraces with switching outputs.\n\nVGA switcheroo calls fbcon_remap_all() when switching clients. The fbcon\nfunction uses struct fb_info.node, which is set by register_framebuffer().\nAs the fb-helper code currently sets up VGA switcheroo before registering\nthe framebuffer, the value of node is -1 and therefore not a legal value.\nFor example, fbcon uses the value within set_con2fb_map() [1] as an index\ninto an array.\n\nMoving vga_switcheroo_client_fb_set() after register_framebuffer() can\nresult in VGA switching that does not switch fbcon correctly.\n\nTherefore move vga_switcheroo_client_fb_set() under fbcon_fb_registered(),\nwhich already holds the console lock. Fbdev calls fbcon_fb_registered()\nfrom within register_framebuffer(). Serializes the helper with VGA\nswitcheroo\u0027s call to fbcon_remap_all().\n\nAlthough vga_switcheroo_client_fb_set() takes an instance of struct fb_info\nas parameter, it really only needs the contained fbcon state. Moving the\ncall to fbcon initialization is therefore cleaner than before. Only amdgpu,\ni915, nouveau and radeon support vga_switcheroo. For all other drivers,\nthis change does nothing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68296",
"url": "https://www.suse.com/security/cve/CVE-2025-68296"
},
{
"category": "external",
"summary": "SUSE Bug 1255128 for CVE-2025-68296",
"url": "https://bugzilla.suse.com/1255128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68296"
},
{
"cve": "CVE-2025-68297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68297"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix crash in process_v2_sparse_read() for encrypted directories\n\nThe crash in process_v2_sparse_read() for fscrypt-encrypted directories\nhas been reported. Issue takes place for Ceph msgr2 protocol in secure\nmode. It can be reproduced by the steps:\n\nsudo mount -t ceph :/ /mnt/cephfs/ -o name=admin,fs=cephfs,ms_mode=secure\n\n(1) mkdir /mnt/cephfs/fscrypt-test-3\n(2) cp area_decrypted.tar /mnt/cephfs/fscrypt-test-3\n(3) fscrypt encrypt --source=raw_key --key=./my.key /mnt/cephfs/fscrypt-test-3\n(4) fscrypt lock /mnt/cephfs/fscrypt-test-3\n(5) fscrypt unlock --key=my.key /mnt/cephfs/fscrypt-test-3\n(6) cat /mnt/cephfs/fscrypt-test-3/area_decrypted.tar\n(7) Issue has been triggered\n\n[ 408.072247] ------------[ cut here ]------------\n[ 408.072251] WARNING: CPU: 1 PID: 392 at net/ceph/messenger_v2.c:865\nceph_con_v2_try_read+0x4b39/0x72f0\n[ 408.072267] Modules linked in: intel_rapl_msr intel_rapl_common\nintel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_discovery\npmt_class intel_pmc_ssram_telemetry intel_vsec kvm_intel joydev kvm irqbypass\npolyval_clmulni ghash_clmulni_intel aesni_intel rapl input_leds psmouse\nserio_raw i2c_piix4 vga16fb bochs vgastate i2c_smbus floppy mac_hid qemu_fw_cfg\npata_acpi sch_fq_codel rbd msr parport_pc ppdev lp parport efi_pstore\n[ 408.072304] CPU: 1 UID: 0 PID: 392 Comm: kworker/1:3 Not tainted 6.17.0-rc7+\n[ 408.072307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.17.0-5.fc42 04/01/2014\n[ 408.072310] Workqueue: ceph-msgr ceph_con_workfn\n[ 408.072314] RIP: 0010:ceph_con_v2_try_read+0x4b39/0x72f0\n[ 408.072317] Code: c7 c1 20 f0 d4 ae 50 31 d2 48 c7 c6 60 27 d5 ae 48 c7 c7 f8\n8e 6f b0 68 60 38 d5 ae e8 00 47 61 fe 48 83 c4 18 e9 ac fc ff ff \u003c0f\u003e 0b e9 06\nfe ff ff 4c 8b 9d 98 fd ff ff 0f 84 64 e7 ff ff 89 85\n[ 408.072319] RSP: 0018:ffff88811c3e7a30 EFLAGS: 00010246\n[ 408.072322] RAX: ffffed1024874c6f RBX: ffffea00042c2b40 RCX: 0000000000000f38\n[ 408.072324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 408.072325] RBP: ffff88811c3e7ca8 R08: 0000000000000000 R09: 00000000000000c8\n[ 408.072326] R10: 00000000000000c8 R11: 0000000000000000 R12: 00000000000000c8\n[ 408.072327] R13: dffffc0000000000 R14: ffff8881243a6030 R15: 0000000000003000\n[ 408.072329] FS: 0000000000000000(0000) GS:ffff88823eadf000(0000)\nknlGS:0000000000000000\n[ 408.072331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 408.072332] CR2: 000000c0003c6000 CR3: 000000010c106005 CR4: 0000000000772ef0\n[ 408.072336] PKRU: 55555554\n[ 408.072337] Call Trace:\n[ 408.072338] \u003cTASK\u003e\n[ 408.072340] ? sched_clock_noinstr+0x9/0x10\n[ 408.072344] ? __pfx_ceph_con_v2_try_read+0x10/0x10\n[ 408.072347] ? _raw_spin_unlock+0xe/0x40\n[ 408.072349] ? finish_task_switch.isra.0+0x15d/0x830\n[ 408.072353] ? __kasan_check_write+0x14/0x30\n[ 408.072357] ? mutex_lock+0x84/0xe0\n[ 408.072359] ? __pfx_mutex_lock+0x10/0x10\n[ 408.072361] ceph_con_workfn+0x27e/0x10e0\n[ 408.072364] ? metric_delayed_work+0x311/0x2c50\n[ 408.072367] process_one_work+0x611/0xe20\n[ 408.072371] ? __kasan_check_write+0x14/0x30\n[ 408.072373] worker_thread+0x7e3/0x1580\n[ 408.072375] ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 408.072378] ? __pfx_worker_thread+0x10/0x10\n[ 408.072381] kthread+0x381/0x7a0\n[ 408.072383] ? __pfx__raw_spin_lock_irq+0x10/0x10\n[ 408.072385] ? __pfx_kthread+0x10/0x10\n[ 408.072387] ? __kasan_check_write+0x14/0x30\n[ 408.072389] ? recalc_sigpending+0x160/0x220\n[ 408.072392] ? _raw_spin_unlock_irq+0xe/0x50\n[ 408.072394] ? calculate_sigpending+0x78/0xb0\n[ 408.072395] ? __pfx_kthread+0x10/0x10\n[ 408.072397] ret_from_fork+0x2b6/0x380\n[ 408.072400] ? __pfx_kthread+0x10/0x10\n[ 408.072402] ret_from_fork_asm+0x1a/0x30\n[ 408.072406] \u003c/TASK\u003e\n[ 408.072407] ---[ end trace 0000000000000000 ]---\n[ 408.072418] Oops: general protection fault, probably for non-canonical\naddress 0xdffffc00000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68297",
"url": "https://www.suse.com/security/cve/CVE-2025-68297"
},
{
"category": "external",
"summary": "SUSE Bug 1255403 for CVE-2025-68297",
"url": "https://bugzilla.suse.com/1255403"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68297"
},
{
"cve": "CVE-2025-68301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix fragment overflow handling in RX path\n\nThe atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)\nfragments when handling large multi-descriptor packets. This causes an\nout-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.\n\nThe issue occurs because the driver doesn\u0027t check the total number of\nfragments before calling skb_add_rx_frag(). When a packet requires more\nthan MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.\n\nFix by assuming there will be an extra frag if buff-\u003elen \u003e AQ_CFG_RX_HDR_SIZE,\nthen all fragments are accounted for. And reusing the existing check to\nprevent the overflow earlier in the code path.\n\nThis crash occurred in production with an Aquantia AQC113 10G NIC.\n\nStack trace from production environment:\n```\nRIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0\nCode: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89\nca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90\nc8 00 00 00 \u003c48\u003e 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48\n89 fa 83\nRSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287\nRAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:\nfffffffe0a0c8000\nRDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:\n0000000000037a40\nRBP: 0000000000000024 R08: 0000000000000000 R09:\n0000000000000021\nR10: 0000000000000848 R11: 0000000000000000 R12:\nffffa9bec02a8e24\nR13: ffff925ad8615570 R14: 0000000000000000 R15:\nffff925b22e80a00\nFS: 0000000000000000(0000)\nGS:ffff925e47880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:\n0000000000f72ef0\nPKRU: 55555554\nCall Trace:\n\u003cIRQ\u003e\naq_ring_rx_clean+0x175/0xe60 [atlantic]\n? aq_ring_rx_clean+0x14d/0xe60 [atlantic]\n? aq_ring_tx_clean+0xdf/0x190 [atlantic]\n? kmem_cache_free+0x348/0x450\n? aq_vec_poll+0x81/0x1d0 [atlantic]\n? __napi_poll+0x28/0x1c0\n? net_rx_action+0x337/0x420\n```\n\nChanges in v4:\n- Add Fixes: tag to satisfy patch validation requirements.\n\nChanges in v3:\n- Fix by assuming there will be an extra frag if buff-\u003elen \u003e AQ_CFG_RX_HDR_SIZE,\n then all fragments are accounted for.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68301",
"url": "https://www.suse.com/security/cve/CVE-2025-68301"
},
{
"category": "external",
"summary": "SUSE Bug 1255120 for CVE-2025-68301",
"url": "https://bugzilla.suse.com/1255120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68301"
},
{
"cve": "CVE-2025-68320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68320"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlan966x: Fix sleeping in atomic context\n\nThe following warning was seen when we try to connect using ssh to the device.\n\nBUG: sleeping function called from invalid context at kernel/locking/mutex.c:575\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear\npreempt_count: 1, expected: 0\nINFO: lockdep is turned off.\nCPU: 0 UID: 0 PID: 104 Comm: dropbear Tainted: G W 6.18.0-rc2-00399-g6f1ab1b109b9-dirty #530 NONE\nTainted: [W]=WARN\nHardware name: Generic DT based system\nCall trace:\n unwind_backtrace from show_stack+0x10/0x14\n show_stack from dump_stack_lvl+0x7c/0xac\n dump_stack_lvl from __might_resched+0x16c/0x2b0\n __might_resched from __mutex_lock+0x64/0xd34\n __mutex_lock from mutex_lock_nested+0x1c/0x24\n mutex_lock_nested from lan966x_stats_get+0x5c/0x558\n lan966x_stats_get from dev_get_stats+0x40/0x43c\n dev_get_stats from dev_seq_printf_stats+0x3c/0x184\n dev_seq_printf_stats from dev_seq_show+0x10/0x30\n dev_seq_show from seq_read_iter+0x350/0x4ec\n seq_read_iter from seq_read+0xfc/0x194\n seq_read from proc_reg_read+0xac/0x100\n proc_reg_read from vfs_read+0xb0/0x2b0\n vfs_read from ksys_read+0x6c/0xec\n ksys_read from ret_fast_syscall+0x0/0x1c\nException stack(0xf0b11fa8 to 0xf0b11ff0)\n1fa0: 00000001 00001000 00000008 be9048d8 00001000 00000001\n1fc0: 00000001 00001000 00000008 00000003 be905920 0000001e 00000000 00000001\n1fe0: 0005404c be9048c0 00018684 b6ec2cd8\n\nIt seems that we are using a mutex in a atomic context which is wrong.\nChange the mutex with a spinlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68320",
"url": "https://www.suse.com/security/cve/CVE-2025-68320"
},
{
"category": "external",
"summary": "SUSE Bug 1255172 for CVE-2025-68320",
"url": "https://bugzilla.suse.com/1255172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68320"
},
{
"cve": "CVE-2025-68325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68325"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_cake: Fix incorrect qlen reduction in cake_drop\n\nIn cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen\nand backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes\nthat the parent qdisc will enqueue the current packet. However, this\nassumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent\nqdisc stops enqueuing current packet, leaving the tree qlen/backlog\naccounting inconsistent. This mismatch can lead to a NULL dereference\n(e.g., when the parent Qdisc is qfq_qdisc).\n\nThis patch computes the qlen/backlog delta in a more robust way by\nobserving the difference before and after the series of cake_drop()\ncalls, and then compensates the qdisc tree accounting if cake_enqueue()\nreturns NET_XMIT_CN.\n\nTo ensure correct compensation when ACK thinning is enabled, a new\nvariable is introduced to keep qlen unchanged.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68325",
"url": "https://www.suse.com/security/cve/CVE-2025-68325"
},
{
"category": "external",
"summary": "SUSE Bug 1255417 for CVE-2025-68325",
"url": "https://bugzilla.suse.com/1255417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68325"
},
{
"cve": "CVE-2025-68327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68327"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas_usbhs: Fix synchronous external abort on unbind\n\nA synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is\nexecuted after the configuration sequence described above:\n\nmodprobe usb_f_ecm\nmodprobe libcomposite\nmodprobe configfs\ncd /sys/kernel/config/usb_gadget\nmkdir -p g1\ncd g1\necho \"0x1d6b\" \u003e idVendor\necho \"0x0104\" \u003e idProduct\nmkdir -p strings/0x409\necho \"0123456789\" \u003e strings/0x409/serialnumber\necho \"Renesas.\" \u003e strings/0x409/manufacturer\necho \"Ethernet Gadget\" \u003e strings/0x409/product\nmkdir -p functions/ecm.usb0\nmkdir -p configs/c.1\nmkdir -p configs/c.1/strings/0x409\necho \"ECM\" \u003e configs/c.1/strings/0x409/configuration\n\nif [ ! -L configs/c.1/ecm.usb0 ]; then\n ln -s functions/ecm.usb0 configs/c.1\nfi\n\necho 11e20000.usb \u003e UDC\necho 11e20000.usb \u003e /sys/bus/platform/drivers/renesas_usbhs/unbind\n\nThe displayed trace is as follows:\n\n Internal error: synchronous external abort: 0000000096000010 [#1] SMP\n CPU: 0 UID: 0 PID: 188 Comm: sh Tainted: G M 6.17.0-rc7-next-20250922-00010-g41050493b2bd #55 PREEMPT\n Tainted: [M]=MACHINE_CHECK\n Hardware name: Renesas SMARC EVK version 2 based on r9a08g045s33 (DT)\n pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs]\n lr : usbhsg_update_pullup+0x3c/0x68 [renesas_usbhs]\n sp : ffff8000838b3920\n x29: ffff8000838b3920 x28: ffff00000d585780 x27: 0000000000000000\n x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000c3e3810\n x23: ffff00000d5e5c80 x22: ffff00000d5e5d40 x21: 0000000000000000\n x20: 0000000000000000 x19: ffff00000d5e5c80 x18: 0000000000000020\n x17: 2e30303230316531 x16: 312d7968703a7968 x15: 3d454d414e5f4344\n x14: 000000000000002c x13: 0000000000000000 x12: 0000000000000000\n x11: ffff00000f358f38 x10: ffff00000f358db0 x9 : ffff00000b41f418\n x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d\n x5 : 8080808000000000 x4 : 000000004b5ccb9d x3 : 0000000000000000\n x2 : 0000000000000000 x1 : ffff800083790000 x0 : ffff00000d5e5c80\n Call trace:\n usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs] (P)\n usbhsg_pullup+0x4c/0x7c [renesas_usbhs]\n usb_gadget_disconnect_locked+0x48/0xd4\n gadget_unbind_driver+0x44/0x114\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1c8/0x224\n device_release_driver+0x18/0x24\n bus_remove_device+0xcc/0x10c\n device_del+0x14c/0x404\n usb_del_gadget+0x88/0xc0\n usb_del_gadget_udc+0x18/0x30\n usbhs_mod_gadget_remove+0x24/0x44 [renesas_usbhs]\n usbhs_mod_remove+0x20/0x30 [renesas_usbhs]\n usbhs_remove+0x98/0xdc [renesas_usbhs]\n platform_remove+0x20/0x30\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1c8/0x224\n device_driver_detach+0x18/0x24\n unbind_store+0xb4/0xb8\n drv_attr_store+0x24/0x38\n sysfs_kf_write+0x7c/0x94\n kernfs_fop_write_iter+0x128/0x1b8\n vfs_write+0x2ac/0x350\n ksys_write+0x68/0xfc\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: 7100003f 1a9f07e1 531c6c22 f9400001 (79400021)\n ---[ end trace 0000000000000000 ]---\n note: sh[188] exited with irqs disabled\n note: sh[188] exited with preempt_count 1\n\nThe issue occurs because usbhs_sys_function_pullup(), which accesses the IP\nregisters, is executed after the USBHS clocks have been disabled. The\nproblem is reproducible on the Renesas RZ/G3S SoC starting with the\naddition of module stop in the clock enable/disable APIs. With module stop\nfunctionality enabled, a bus error is expected if a master accesses a\nmodule whose clock has been stopped and module stop activated.\n\nDisable the IP clocks at the end of remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68327",
"url": "https://www.suse.com/security/cve/CVE-2025-68327"
},
{
"category": "external",
"summary": "SUSE Bug 1255488 for CVE-2025-68327",
"url": "https://bugzilla.suse.com/1255488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68327"
},
{
"cve": "CVE-2025-68337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted\n\nThere\u0027s issue when file system corrupted:\n------------[ cut here ]------------\nkernel BUG at fs/jbd2/transaction.c:1289!\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next\nRIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0\nRSP: 0018:ffff888117aafa30 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534\nRDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010\nRBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028\nR10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __ext4_journal_get_create_access+0x42/0x170\n ext4_getblk+0x319/0x6f0\n ext4_bread+0x11/0x100\n ext4_append+0x1e6/0x4a0\n ext4_init_new_dir+0x145/0x1d0\n ext4_mkdir+0x326/0x920\n vfs_mkdir+0x45c/0x740\n do_mkdirat+0x234/0x2f0\n __x64_sys_mkdir+0xd6/0x120\n do_syscall_64+0x5f/0xfa0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue occurs with us in errors=continue mode when accompanied by\nstorage failures. There have been many inconsistencies in the file system\ndata.\nIn the case of file system data inconsistency, for example, if the block\nbitmap of a referenced block is not set, it can lead to the situation where\na block being committed is allocated and used again. As a result, the\nfollowing condition will not be satisfied then trigger BUG_ON. Of course,\nit is entirely possible to construct a problematic image that can trigger\nthis BUG_ON through specific operations. In fact, I have constructed such\nan image and easily reproduced this issue.\nTherefore, J_ASSERT() holds true only under ideal conditions, but it may\nnot necessarily be satisfied in exceptional scenarios. Using J_ASSERT()\ndirectly in abnormal situations would cause the system to crash, which is\nclearly not what we want. So here we directly trigger a JBD abort instead\nof immediately invoking BUG_ON.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68337",
"url": "https://www.suse.com/security/cve/CVE-2025-68337"
},
{
"category": "external",
"summary": "SUSE Bug 1255482 for CVE-2025-68337",
"url": "https://bugzilla.suse.com/1255482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68337"
},
{
"cve": "CVE-2025-68349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n -\u003e nfs4_write_inode\n -\u003e pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68349",
"url": "https://www.suse.com/security/cve/CVE-2025-68349"
},
{
"category": "external",
"summary": "SUSE Bug 1255544 for CVE-2025-68349",
"url": "https://bugzilla.suse.com/1255544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68349"
},
{
"cve": "CVE-2025-68363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu\n\nThe bpf_skb_check_mtu helper needs to use skb-\u003etransport_header when\nthe BPF_MTU_CHK_SEGS flag is used:\n\n\tbpf_skb_check_mtu(skb, ifindex, \u0026mtu_len, 0, BPF_MTU_CHK_SEGS)\n\nThe transport_header is not always set. There is a WARN_ON_ONCE\nreport when CONFIG_DEBUG_NET is enabled + skb-\u003egso_size is set +\nbpf_prog_test_run is used:\n\nWARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071\n skb_gso_validate_network_len\n bpf_skb_check_mtu\n bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch\n bpf_test_run\n bpf_prog_test_run_skb\n\nFor a normal ingress skb (not test_run), skb_reset_transport_header\nis performed but there is plan to avoid setting it as described in\ncommit 2170a1f09148 (\"net: no longer reset transport_header in __netif_receive_skb_core()\").\n\nThis patch fixes the bpf helper by checking\nskb_transport_header_was_set(). The check is done just before\nskb-\u003etransport_header is used, to avoid breaking the existing bpf prog.\nThe WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68363",
"url": "https://www.suse.com/security/cve/CVE-2025-68363"
},
{
"category": "external",
"summary": "SUSE Bug 1255552 for CVE-2025-68363",
"url": "https://bugzilla.suse.com/1255552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68363"
},
{
"cve": "CVE-2025-68365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68365"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Initialize allocated memory before use\n\nKMSAN reports: Multiple uninitialized values detected:\n\n- KMSAN: uninit-value in ntfs_read_hdr (3)\n- KMSAN: uninit-value in bcmp (3)\n\nMemory is allocated by __getname(), which is a wrapper for\nkmem_cache_alloc(). This memory is used before being properly\ncleared. Change kmem_cache_alloc() to kmem_cache_zalloc() to\nproperly allocate and clear memory before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68365",
"url": "https://www.suse.com/security/cve/CVE-2025-68365"
},
{
"category": "external",
"summary": "SUSE Bug 1255548 for CVE-2025-68365",
"url": "https://bugzilla.suse.com/1255548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68365"
},
{
"cve": "CVE-2025-68366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68366"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config unlock in nbd_genl_connect\n\nThere is one use-after-free warning when running NBD_CMD_CONNECT and\nNBD_CLEAR_SOCK:\n\nnbd_genl_connect\n nbd_alloc_and_init_config // config_refs=1\n nbd_start_device // config_refs=2\n set NBD_RT_HAS_CONFIG_REF\t\t\topen nbd // config_refs=3\n recv_work done // config_refs=2\n\t\t\t\t\t\tNBD_CLEAR_SOCK // config_refs=1\n\t\t\t\t\t\tclose nbd // config_refs=0\n refcount_inc -\u003e uaf\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290\n nbd_genl_connect+0x16d0/0x1ab0\n genl_family_rcv_msg_doit+0x1f3/0x310\n genl_rcv_msg+0x44a/0x790\n\nThe issue can be easily reproduced by adding a small delay before\nrefcount_inc(\u0026nbd-\u003econfig_refs) in nbd_genl_connect():\n\n mutex_unlock(\u0026nbd-\u003econfig_lock);\n if (!ret) {\n set_bit(NBD_RT_HAS_CONFIG_REF, \u0026config-\u003eruntime_flags);\n+ printk(\"before sleep\\n\");\n+ mdelay(5 * 1000);\n+ printk(\"after sleep\\n\");\n refcount_inc(\u0026nbd-\u003econfig_refs);\n nbd_connect_reply(info, nbd-\u003eindex);\n }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68366",
"url": "https://www.suse.com/security/cve/CVE-2025-68366"
},
{
"category": "external",
"summary": "SUSE Bug 1255622 for CVE-2025-68366",
"url": "https://bugzilla.suse.com/1255622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68366"
},
{
"cve": "CVE-2025-68367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68367"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse\n\nThe following warning appears when running syzkaller, and this issue also\nexists in the mainline code.\n\n ------------[ cut here ]------------\n list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.\n WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130\n Modules linked in:\n CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__list_add_valid_or_report+0xf7/0x130\n RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817\n RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001\n RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c\n R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100\n R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48\n FS: 00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 80000000\n Call Trace:\n \u003cTASK\u003e\n input_register_handler+0xb3/0x210\n mac_hid_start_emulation+0x1c5/0x290\n mac_hid_toggle_emumouse+0x20a/0x240\n proc_sys_call_handler+0x4c2/0x6e0\n new_sync_write+0x1b1/0x2d0\n vfs_write+0x709/0x950\n ksys_write+0x12a/0x250\n do_syscall_64+0x5a/0x110\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe WARNING occurs when two processes concurrently write to the mac-hid\nemulation sysctl, causing a race condition in mac_hid_toggle_emumouse().\nBoth processes read old_val=0, then both try to register the input handler,\nleading to a double list_add of the same handler.\n\n CPU0 CPU1\n ------------------------- -------------------------\n vfs_write() //write 1 vfs_write() //write 1\n proc_sys_write() proc_sys_write()\n mac_hid_toggle_emumouse() mac_hid_toggle_emumouse()\n old_val = *valp // old_val=0\n old_val = *valp // old_val=0\n mutex_lock_killable()\n proc_dointvec() // *valp=1\n mac_hid_start_emulation()\n input_register_handler()\n mutex_unlock()\n mutex_lock_killable()\n proc_dointvec()\n mac_hid_start_emulation()\n input_register_handler() //Trigger Warning\n mutex_unlock()\n\nFix this by moving the old_val read inside the mutex lock region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68367",
"url": "https://www.suse.com/security/cve/CVE-2025-68367"
},
{
"category": "external",
"summary": "SUSE Bug 1255547 for CVE-2025-68367",
"url": "https://bugzilla.suse.com/1255547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68367"
},
{
"cve": "CVE-2025-68372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config put in recv_work\n\nThere is one uaf issue in recv_work when running NBD_CLEAR_SOCK and\nNBD_CMD_RECONFIGURE:\n nbd_genl_connect // conf_ref=2 (connect and recv_work A)\n nbd_open\t // conf_ref=3\n recv_work A done // conf_ref=2\n NBD_CLEAR_SOCK // conf_ref=1\n nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)\n close nbd\t // conf_ref=1\n recv_work B\n config_put // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nOr only running NBD_CLEAR_SOCK:\n nbd_genl_connect // conf_ref=2\n nbd_open \t // conf_ref=3\n NBD_CLEAR_SOCK // conf_ref=2\n close nbd\n nbd_release\n config_put // conf_ref=1\n recv_work\n config_put \t // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nCommit 87aac3a80af5 (\"nbd: call nbd_config_put() before notifying the\nwaiter\") moved nbd_config_put() to run before waking up the waiter in\nrecv_work, in order to ensure that nbd_start_device_ioctl() would not\nbe woken up while nbd-\u003etask_recv was still uncleared.\n\nHowever, in nbd_start_device_ioctl(), after being woken up it explicitly\ncalls flush_workqueue() to make sure all current works are finished.\nTherefore, there is no need to move the config put ahead of the wakeup.\n\nMove nbd_config_put() to the end of recv_work, so that the reference is\nheld for the whole lifetime of the worker thread. This makes sure the\nconfig cannot be freed while recv_work is still running, even if clear\n+ reconfigure interleave.\n\nIn addition, we don\u0027t need to worry about recv_work dropping the last\nnbd_put (which causes deadlock):\n\npath A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=1 (trigger recv_work)\n open nbd // nbd_refs=2\n NBD_CLEAR_SOCK\n close nbd\n nbd_release\n nbd_disconnect_and_put\n flush_workqueue // recv_work done\n nbd_config_put\n nbd_put // nbd_refs=1\n nbd_put // nbd_refs=0\n queue_work\n\npath B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=2 (trigger recv_work)\n open nbd // nbd_refs=3\n NBD_CLEAR_SOCK // conf_refs=2\n close nbd\n nbd_release\n nbd_config_put // conf_refs=1\n nbd_put // nbd_refs=2\n recv_work done // conf_refs=0, nbd_refs=1\n rmmod // nbd_refs=0\n\nDepends-on: e2daec488c57 (\"nbd: Fix hungtask when nbd_config_put\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68372",
"url": "https://www.suse.com/security/cve/CVE-2025-68372"
},
{
"category": "external",
"summary": "SUSE Bug 1255537 for CVE-2025-68372",
"url": "https://bugzilla.suse.com/1255537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68372"
},
{
"cve": "CVE-2025-68379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure\n\nA NULL pointer dereference can occur in rxe_srq_chk_attr() when\nibv_modify_srq() is invoked twice in succession under certain error\nconditions. The first call may fail in rxe_queue_resize(), which leads\nrxe_srq_from_attr() to set srq-\u003erq.queue = NULL. The second call then\ntriggers a crash (null deref) when accessing\nsrq-\u003erq.queue-\u003ebuf-\u003eindex_mask.\n\nCall Trace:\n\u003cTASK\u003e\nrxe_modify_srq+0x170/0x480 [rdma_rxe]\n? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]\n? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]\n? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]\nib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]\n? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]\n? tryinc_node_nr_active+0xe6/0x150\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\nib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]\n? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]\n? __pfx___raw_spin_lock_irqsave+0x10/0x10\n? __pfx_do_vfs_ioctl+0x10/0x10\n? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0\n? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10\nib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]\n? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]\n__x64_sys_ioctl+0x138/0x1c0\ndo_syscall_64+0x82/0x250\n? fdget_pos+0x58/0x4c0\n? ksys_write+0xf3/0x1c0\n? __pfx_ksys_write+0x10/0x10\n? do_syscall_64+0xc8/0x250\n? __pfx_vm_mmap_pgoff+0x10/0x10\n? fget+0x173/0x230\n? fput+0x2a/0x80\n? ksys_mmap_pgoff+0x224/0x4c0\n? do_syscall_64+0xc8/0x250\n? do_user_addr_fault+0x37b/0xfe0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68379",
"url": "https://www.suse.com/security/cve/CVE-2025-68379"
},
{
"category": "external",
"summary": "SUSE Bug 1255695 for CVE-2025-68379",
"url": "https://bugzilla.suse.com/1255695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68379"
},
{
"cve": "CVE-2025-68725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68725"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Do not let BPF test infra emit invalid GSO types to stack\n\nYinhao et al. reported that their fuzzer tool was able to trigger a\nskb_warn_bad_offload() from netif_skb_features() -\u003e gso_features_check().\nWhen a BPF program - triggered via BPF test infra - pushes the packet\nto the loopback device via bpf_clone_redirect() then mentioned offload\nwarning can be seen. GSO-related features are then rightfully disabled.\n\nWe get into this situation due to convert___skb_to_skb() setting\ngso_segs and gso_size but not gso_type. Technically, it makes sense\nthat this warning triggers since the GSO properties are malformed due\nto the gso_type. Potentially, the gso_type could be marked non-trustworthy\nthrough setting it at least to SKB_GSO_DODGY without any other specific\nassumptions, but that also feels wrong given we should not go further\ninto the GSO engine in the first place.\n\nThe checks were added in 121d57af308d (\"gso: validate gso_type in GSO\nhandlers\") because there were malicious (syzbot) senders that combine\na protocol with a non-matching gso_type. If we would want to drop such\npackets, gso_features_check() currently only returns feature flags via\nnetif_skb_features(), so one location for potentially dropping such skbs\ncould be validate_xmit_unreadable_skb(), but then otoh it would be\nan additional check in the fast-path for a very corner case. Given\nbpf_clone_redirect() is the only place where BPF test infra could emit\nsuch packets, lets reject them right there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68725",
"url": "https://www.suse.com/security/cve/CVE-2025-68725"
},
{
"category": "external",
"summary": "SUSE Bug 1255569 for CVE-2025-68725",
"url": "https://bugzilla.suse.com/1255569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68725"
},
{
"cve": "CVE-2025-68727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68727"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to \u0027de\u0027; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68727",
"url": "https://www.suse.com/security/cve/CVE-2025-68727"
},
{
"category": "external",
"summary": "SUSE Bug 1255568 for CVE-2025-68727",
"url": "https://bugzilla.suse.com/1255568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68727"
},
{
"cve": "CVE-2025-68728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: fix uninit memory after failed mi_read in mi_format_new\n\nFix a KMSAN un-init bug found by syzkaller.\n\nntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be\nuptodate. We do not bring the buffer uptodate before setting it as\nuptodate. If the buffer were to not be uptodate, it could mean adding a\nbuffer with un-init data to the mi record. Attempting to load that record\nwill trigger KMSAN.\n\nAvoid this by setting the buffer as uptodate, if it\u0027s not already, by\noverwriting it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68728",
"url": "https://www.suse.com/security/cve/CVE-2025-68728"
},
{
"category": "external",
"summary": "SUSE Bug 1255539 for CVE-2025-68728",
"url": "https://bugzilla.suse.com/1255539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68728"
},
{
"cve": "CVE-2025-68733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmack: fix bug: unprivileged task can create labels\n\nIf an unprivileged task is allowed to relabel itself\n(/smack/relabel-self is not empty),\nit can freely create new labels by writing their\nnames into own /proc/PID/attr/smack/current\n\nThis occurs because do_setattr() imports\nthe provided label in advance,\nbefore checking \"relabel-self\" list.\n\nThis change ensures that the \"relabel-self\" list\nis checked before importing the label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68733",
"url": "https://www.suse.com/security/cve/CVE-2025-68733"
},
{
"category": "external",
"summary": "SUSE Bug 1255615 for CVE-2025-68733",
"url": "https://bugzilla.suse.com/1255615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68733"
},
{
"cve": "CVE-2025-68764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68764"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags\n\nWhen a filesystem is being automounted, it needs to preserve the\nuser-set superblock mount options, such as the \"ro\" flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68764",
"url": "https://www.suse.com/security/cve/CVE-2025-68764"
},
{
"category": "external",
"summary": "SUSE Bug 1255930 for CVE-2025-68764",
"url": "https://bugzilla.suse.com/1255930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68764"
},
{
"cve": "CVE-2025-68768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: frags: flush pending skbs in fqdir_pre_exit()\n\nWe have been seeing occasional deadlocks on pernet_ops_rwsem since\nSeptember in NIPA. The stuck task was usually modprobe (often loading\na driver like ipvlan), trying to take the lock as a Writer.\nlockdep does not track readers for rwsems so the read wasn\u0027t obvious\nfrom the reports.\n\nOn closer inspection the Reader holding the lock was conntrack looping\nforever in nf_conntrack_cleanup_net_list(). Based on past experience\nwith occasional NIPA crashes I looked thru the tests which run before\nthe crash and noticed that the crash follows ip_defrag.sh. An immediate\nred flag. Scouring thru (de)fragmentation queues reveals skbs sitting\naround, holding conntrack references.\n\nThe problem is that since conntrack depends on nf_defrag_ipv6,\nnf_defrag_ipv6 will load first. Since nf_defrag_ipv6 loads first its\nnetns exit hooks run _after_ conntrack\u0027s netns exit hook.\n\nFlush all fragment queue SKBs during fqdir_pre_exit() to release\nconntrack references before conntrack cleanup runs. Also flush\nthe queues in timer expiry handlers when they discover fqdir-\u003edead\nis set, in case packet sneaks in while we\u0027re running the pre_exit\nflush.\n\nThe commit under Fixes is not exactly the culprit, but I think\npreviously the timer firing would eventually unblock the spinning\nconntrack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68768",
"url": "https://www.suse.com/security/cve/CVE-2025-68768"
},
{
"category": "external",
"summary": "SUSE Bug 1256579 for CVE-2025-68768",
"url": "https://bugzilla.suse.com/1256579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68768"
},
{
"cve": "CVE-2025-68770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68770"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix XDP_TX path\n\nFor XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not\ncorrect. __bnxt_poll_work() -\u003e bnxt_rx_pkt() -\u003e bnxt_rx_xdp() may be\nlooping within NAPI and some event flags may be set in earlier\niterations. In particular, if BNXT_TX_EVENT is set earlier indicating\nsome XDP_TX packets are ready and pending, it will be cleared if it is\nXDP_TX action again. Normally, we will set BNXT_TX_EVENT again when we\nsuccessfully call __bnxt_xmit_xdp(). But if the TX ring has no more\nroom, the flag will not be set. This will cause the TX producer to be\nahead but the driver will not hit the TX doorbell.\n\nFor multi-buf XDP_TX, there is no need to clear the event flags and set\nBNXT_AGG_EVENT. The BNXT_AGG_EVENT flag should have been set earlier in\nbnxt_rx_pkt().\n\nThe visible symptom of this is that the RX ring associated with the\nTX XDP ring will eventually become empty and all packets will be dropped.\nBecause this condition will cause the driver to not refill the RX ring\nseeing that the TX ring has forever pending XDP_TX packets.\n\nThe fix is to only clear BNXT_RX_EVENT when we have successfully\ncalled __bnxt_xmit_xdp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68770",
"url": "https://www.suse.com/security/cve/CVE-2025-68770"
},
{
"category": "external",
"summary": "SUSE Bug 1256584 for CVE-2025-68770",
"url": "https://bugzilla.suse.com/1256584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68770"
},
{
"cve": "CVE-2025-68771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix kernel BUG in ocfs2_find_victim_chain\n\nsyzbot reported a kernel BUG in ocfs2_find_victim_chain() because the\n`cl_next_free_rec` field of the allocation chain list (next free slot in\nthe chain list) is 0, triggring the BUG_ON(!cl-\u003ecl_next_free_rec)\ncondition in ocfs2_find_victim_chain() and panicking the kernel.\n\nTo fix this, an if condition is introduced in ocfs2_claim_suballoc_bits(),\njust before calling ocfs2_find_victim_chain(), the code block in it being\nexecuted when either of the following conditions is true:\n\n1. `cl_next_free_rec` is equal to 0, indicating that there are no free\nchains in the allocation chain list\n2. `cl_next_free_rec` is greater than `cl_count` (the total number of\nchains in the allocation chain list)\n\nEither of them being true is indicative of the fact that there are no\nchains left for usage.\n\nThis is addressed using ocfs2_error(), which prints\nthe error log for debugging purposes, rather than panicking the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68771",
"url": "https://www.suse.com/security/cve/CVE-2025-68771"
},
{
"category": "external",
"summary": "SUSE Bug 1256582 for CVE-2025-68771",
"url": "https://bugzilla.suse.com/1256582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68771"
},
{
"cve": "CVE-2025-68773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68773"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fsl-cpm: Check length parity before switching to 16 bit mode\n\nCommit fc96ec826bce (\"spi: fsl-cpm: Use 16 bit mode for large transfers\nwith even size\") failed to make sure that the size is really even\nbefore switching to 16 bit mode. Until recently the problem went\nunnoticed because kernfs uses a pre-allocated bounce buffer of size\nPAGE_SIZE for reading EEPROM.\n\nBut commit 8ad6249c51d0 (\"eeprom: at25: convert to spi-mem API\")\nintroduced an additional dynamically allocated bounce buffer whose size\nis exactly the size of the transfer, leading to a buffer overrun in\nthe fsl-cpm driver when that size is odd.\n\nAdd the missing length parity verification and remain in 8 bit mode\nwhen the length is not even.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68773",
"url": "https://www.suse.com/security/cve/CVE-2025-68773"
},
{
"category": "external",
"summary": "SUSE Bug 1256586 for CVE-2025-68773",
"url": "https://bugzilla.suse.com/1256586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68773"
},
{
"cve": "CVE-2025-68775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: duplicate handshake cancellations leak socket\n\nWhen a handshake request is cancelled it is removed from the\nhandshake_net-\u003ehn_requests list, but it is still present in the\nhandshake_rhashtbl until it is destroyed.\n\nIf a second cancellation request arrives for the same handshake request,\nthen remove_pending() will return false... and assuming\nHANDSHAKE_F_REQ_COMPLETED isn\u0027t set in req-\u003ehr_flags, we\u0027ll continue\nprocessing through the out_true label, where we put another reference on\nthe sock and a refcount underflow occurs.\n\nThis can happen for example if a handshake times out - particularly if\nthe SUNRPC client sends the AUTH_TLS probe to the server but doesn\u0027t\nfollow it up with the ClientHello due to a problem with tlshd. When the\ntimeout is hit on the server, the server will send a FIN, which triggers\na cancellation request via xs_reset_transport(). When the timeout is\nhit on the client, another cancellation request happens via\nxs_tls_handshake_sync().\n\nAdd a test_and_set_bit(HANDSHAKE_F_REQ_COMPLETED) in the pending cancel\npath so duplicate cancels can be detected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68775",
"url": "https://www.suse.com/security/cve/CVE-2025-68775"
},
{
"category": "external",
"summary": "SUSE Bug 1256665 for CVE-2025-68775",
"url": "https://bugzilla.suse.com/1256665"
},
{
"category": "external",
"summary": "SUSE Bug 1256666 for CVE-2025-68775",
"url": "https://bugzilla.suse.com/1256666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-68775"
},
{
"cve": "CVE-2025-68776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68776"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/hsr: fix NULL pointer dereference in prp_get_untagged_frame()\n\nprp_get_untagged_frame() calls __pskb_copy() to create frame-\u003eskb_std\nbut doesn\u0027t check if the allocation failed. If __pskb_copy() returns\nNULL, skb_clone() is called with a NULL pointer, causing a crash:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]\nCPU: 0 UID: 0 PID: 5625 Comm: syz.1.18 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:skb_clone+0xd7/0x3a0 net/core/skbuff.c:2041\nCode: 03 42 80 3c 20 00 74 08 4c 89 f7 e8 23 29 05 f9 49 83 3e 00 0f 85 a0 01 00 00 e8 94 dd 9d f8 48 8d 6b 7e 49 89 ee 49 c1 ee 03 \u003c43\u003e 0f b6 04 26 84 c0 0f 85 d1 01 00 00 44 0f b6 7d 00 41 83 e7 0c\nRSP: 0018:ffffc9000d00f200 EFLAGS: 00010207\nRAX: ffffffff892235a1 RBX: 0000000000000000 RCX: ffff88803372a480\nRDX: 0000000000000000 RSI: 0000000000000820 RDI: 0000000000000000\nRBP: 000000000000007e R08: ffffffff8f7d0f77 R09: 1ffffffff1efa1ee\nR10: dffffc0000000000 R11: fffffbfff1efa1ef R12: dffffc0000000000\nR13: 0000000000000820 R14: 000000000000000f R15: ffff88805144cc00\nFS: 0000555557f6d500(0000) GS:ffff88808d72f000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000555581d35808 CR3: 000000005040e000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n hsr_forward_do net/hsr/hsr_forward.c:-1 [inline]\n hsr_forward_skb+0x1013/0x2860 net/hsr/hsr_forward.c:741\n hsr_handle_frame+0x6ce/0xa70 net/hsr/hsr_slave.c:84\n __netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966\n __netif_receive_skb_one_core net/core/dev.c:6077 [inline]\n __netif_receive_skb+0x72/0x380 net/core/dev.c:6192\n netif_receive_skb_internal net/core/dev.c:6278 [inline]\n netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337\n tun_rx_batched+0x1b9/0x730 drivers/net/tun.c:1485\n tun_get_user+0x2b65/0x3e90 drivers/net/tun.c:1953\n tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x5c9/0xb30 fs/read_write.c:686\n ksys_write+0x145/0x250 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f0449f8e1ff\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48\nRSP: 002b:00007ffd7ad94c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007f044a1e5fa0 RCX: 00007f0449f8e1ff\nRDX: 000000000000003e RSI: 0000200000000500 RDI: 00000000000000c8\nRBP: 00007ffd7ad94d20 R08: 0000000000000000 R09: 0000000000000000\nR10: 000000000000003e R11: 0000000000000293 R12: 0000000000000001\nR13: 00007f044a1e5fa0 R14: 00007f044a1e5fa0 R15: 0000000000000003\n \u003c/TASK\u003e\n\nAdd a NULL check immediately after __pskb_copy() to handle allocation\nfailures gracefully.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68776",
"url": "https://www.suse.com/security/cve/CVE-2025-68776"
},
{
"category": "external",
"summary": "SUSE Bug 1256659 for CVE-2025-68776",
"url": "https://bugzilla.suse.com/1256659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68776"
},
{
"cve": "CVE-2025-68777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68777"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ti_am335x_tsc - fix off-by-one error in wire_order validation\n\nThe current validation \u0027wire_order[i] \u003e ARRAY_SIZE(config_pins)\u0027 allows\nwire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds\naccess when used as index in \u0027config_pins[wire_order[i]]\u0027.\n\nSince config_pins has 4 elements (indices 0-3), the valid range for\nwire_order should be 0-3. Fix the off-by-one error by using \u003e= instead\nof \u003e in the validation check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68777",
"url": "https://www.suse.com/security/cve/CVE-2025-68777"
},
{
"category": "external",
"summary": "SUSE Bug 1256655 for CVE-2025-68777",
"url": "https://bugzilla.suse.com/1256655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68777"
},
{
"cve": "CVE-2025-68783",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68783"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-mixer: us16x08: validate meter packet indices\n\nget_meter_levels_from_urb() parses the 64-byte meter packets sent by\nthe device and fills the per-channel arrays meter_level[],\ncomp_level[] and master_level[] in struct snd_us16x08_meter_store.\n\nCurrently the function derives the channel index directly from the\nmeter packet (MUB2(meter_urb, s) - 1) and uses it to index those\narrays without validating the range. If the packet contains a\nnegative or out-of-range channel number, the driver may write past\nthe end of these arrays.\n\nIntroduce a local channel variable and validate it before updating the\narrays. We reject negative indices, limit meter_level[] and\ncomp_level[] to SND_US16X08_MAX_CHANNELS, and guard master_level[]\nupdates with ARRAY_SIZE(master_level).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68783",
"url": "https://www.suse.com/security/cve/CVE-2025-68783"
},
{
"category": "external",
"summary": "SUSE Bug 1256650 for CVE-2025-68783",
"url": "https://bugzilla.suse.com/1256650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68783"
},
{
"cve": "CVE-2025-68788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: do not generate ACCESS/MODIFY events on child for special files\n\ninotify/fanotify do not allow users with no read access to a file to\nsubscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the\nsame user to subscribe for watching events on children when the user\nhas access to the parent directory (e.g. /dev).\n\nUsers with no read access to a file but with read access to its parent\ndirectory can still stat the file and see if it was accessed/modified\nvia atime/mtime change.\n\nThe same is not true for special files (e.g. /dev/null). Users will not\ngenerally observe atime/mtime changes when other users read/write to\nspecial files, only when someone sets atime/mtime via utimensat().\n\nAlign fsnotify events with this stat behavior and do not generate\nACCESS/MODIFY events to parent watchers on read/write of special files.\nThe events are still generated to parent watchers on utimensat(). This\ncloses some side-channels that could be possibly used for information\nexfiltration [1].\n\n[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68788",
"url": "https://www.suse.com/security/cve/CVE-2025-68788"
},
{
"category": "external",
"summary": "SUSE Bug 1256638 for CVE-2025-68788",
"url": "https://bugzilla.suse.com/1256638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68788"
},
{
"cve": "CVE-2025-68789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68789"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68789",
"url": "https://www.suse.com/security/cve/CVE-2025-68789"
},
{
"category": "external",
"summary": "SUSE Bug 1256781 for CVE-2025-68789",
"url": "https://bugzilla.suse.com/1256781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68789"
},
{
"cve": "CVE-2025-68795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68795"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: Avoid overflowing userspace buffer on stats query\n\nThe ethtool -S command operates across three ioctl calls:\nETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and\nETHTOOL_GSTATS for the values.\n\nIf the number of stats changes between these calls (e.g., due to device\nreconfiguration), userspace\u0027s buffer allocation will be incorrect,\npotentially leading to buffer overflow.\n\nDrivers are generally expected to maintain stable stat counts, but some\ndrivers (e.g., mlx5, bnx2x, bna, ksz884x) use dynamic counters, making\nthis scenario possible.\n\nSome drivers try to handle this internally:\n- bnad_get_ethtool_stats() returns early in case stats.n_stats is not\n equal to the driver\u0027s stats count.\n- micrel/ksz884x also makes sure not to write anything beyond\n stats.n_stats and overflow the buffer.\n\nHowever, both use stats.n_stats which is already assigned with the value\nreturned from get_sset_count(), hence won\u0027t solve the issue described\nhere.\n\nChange ethtool_get_strings(), ethtool_get_stats(),\nethtool_get_phy_stats() to not return anything in case of a mismatch\nbetween userspace\u0027s size and get_sset_size(), to prevent buffer\noverflow.\nThe returned n_stats value will be equal to zero, to reflect that\nnothing has been returned.\n\nThis could result in one of two cases when using upstream ethtool,\ndepending on when the size change is detected:\n1. When detected in ethtool_get_strings():\n # ethtool -S eth2\n no stats available\n\n2. When detected in get stats, all stats will be reported as zero.\n\nBoth cases are presumably transient, and a subsequent ethtool call\nshould succeed.\n\nOther than the overflow avoidance, these two cases are very evident (no\noutput/cleared stats), which is arguably better than presenting\nincorrect/shifted stats.\nI also considered returning an error instead of a \"silent\" response, but\nthat seems more destructive towards userspace apps.\n\nNotes:\n- This patch does not claim to fix the inherent race, it only makes sure\n that we do not overflow the userspace buffer, and makes for a more\n predictable behavior.\n\n- RTNL lock is held during each ioctl, the race window exists between\n the separate ioctl calls when the lock is released.\n\n- Userspace ethtool always fills stats.n_stats, but it is likely that\n these stats ioctls are implemented in other userspace applications\n which might not fill it. The added code checks that it\u0027s not zero,\n to prevent any regressions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68795",
"url": "https://www.suse.com/security/cve/CVE-2025-68795"
},
{
"category": "external",
"summary": "SUSE Bug 1256688 for CVE-2025-68795",
"url": "https://bugzilla.suse.com/1256688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68795"
},
{
"cve": "CVE-2025-68797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68797"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nchar: applicom: fix NULL pointer dereference in ac_ioctl\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nIn ac_ioctl, the validation of IndexCard and the check for a valid\nRamIO pointer are skipped when cmd is 6. However, the function\nunconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the\nend.\n\nIf cmd is 6, IndexCard may reference a board that does not exist\n(where RamIO is NULL), leading to a NULL pointer dereference.\n\nFix this by skipping the readb access when cmd is 6, as this\ncommand is a global information query and does not target a specific\nboard context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68797",
"url": "https://www.suse.com/security/cve/CVE-2025-68797"
},
{
"category": "external",
"summary": "SUSE Bug 1256660 for CVE-2025-68797",
"url": "https://bugzilla.suse.com/1256660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68797"
},
{
"cve": "CVE-2025-68798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68798"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/amd: Check event before enable to avoid GPF\n\nOn AMD machines cpuc-\u003eevents[idx] can become NULL in a subtle race\ncondition with NMI-\u003ethrottle-\u003ex86_pmu_stop().\n\nCheck event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.\nThis appears to be an AMD only issue.\n\nSyzkaller reported a GPF in amd_pmu_enable_all.\n\nINFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143\n msecs\nOops: general protection fault, probably for non-canonical address\n 0xdffffc0000000034: 0000 PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7]\nCPU: 0 UID: 0 PID: 328415 Comm: repro_36674776 Not tainted 6.12.0-rc1-syzk\nRIP: 0010:x86_pmu_enable_event (arch/x86/events/perf_event.h:1195\n arch/x86/events/core.c:1430)\nRSP: 0018:ffff888118009d60 EFLAGS: 00010012\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000034 RSI: 0000000000000000 RDI: 00000000000001a0\nRBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002\nR13: ffff88811802a440 R14: ffff88811802a240 R15: ffff8881132d8601\nFS: 00007f097dfaa700(0000) GS:ffff888118000000(0000) GS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200001c0 CR3: 0000000103d56000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\namd_pmu_enable_all (arch/x86/events/amd/core.c:760 (discriminator 2))\nx86_pmu_enable (arch/x86/events/core.c:1360)\nevent_sched_out (kernel/events/core.c:1191 kernel/events/core.c:1186\n kernel/events/core.c:2346)\n__perf_remove_from_context (kernel/events/core.c:2435)\nevent_function (kernel/events/core.c:259)\nremote_function (kernel/events/core.c:92 (discriminator 1)\n kernel/events/core.c:72 (discriminator 1))\n__flush_smp_call_function_queue (./arch/x86/include/asm/jump_label.h:27\n ./include/linux/jump_label.h:207 ./include/trace/events/csd.h:64\n kernel/smp.c:135 kernel/smp.c:540)\n__sysvec_call_function_single (./arch/x86/include/asm/jump_label.h:27\n ./include/linux/jump_label.h:207\n ./arch/x86/include/asm/trace/irq_vectors.h:99 arch/x86/kernel/smp.c:272)\nsysvec_call_function_single (arch/x86/kernel/smp.c:266 (discriminator 47)\n arch/x86/kernel/smp.c:266 (discriminator 47))\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68798",
"url": "https://www.suse.com/security/cve/CVE-2025-68798"
},
{
"category": "external",
"summary": "SUSE Bug 1256689 for CVE-2025-68798",
"url": "https://bugzilla.suse.com/1256689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68798"
},
{
"cve": "CVE-2025-68800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68800"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats\n\nCited commit added a dedicated mutex (instead of RTNL) to protect the\nmulticast route list, so that it will not change while the driver\nperiodically traverses it in order to update the kernel about multicast\nroute stats that were queried from the device.\n\nOne instance of list entry deletion (during route replace) was missed\nand it can result in a use-after-free [1].\n\nFix by acquiring the mutex before deleting the entry from the list and\nreleasing it afterwards.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\nRead of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043\n\nCPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)\nHardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017\nWorkqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xba/0x110\n print_report+0x174/0x4f5\n kasan_report+0xdf/0x110\n mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_save_free_info+0x3b/0x70\n __kasan_slab_free+0x43/0x70\n kfree+0x14e/0x700\n mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68800",
"url": "https://www.suse.com/security/cve/CVE-2025-68800"
},
{
"category": "external",
"summary": "SUSE Bug 1256646 for CVE-2025-68800",
"url": "https://bugzilla.suse.com/1256646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68800"
},
{
"cve": "CVE-2025-68801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68801"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_router: Fix neighbour use-after-free\n\nWe sometimes observe use-after-free when dereferencing a neighbour [1].\nThe problem seems to be that the driver stores a pointer to the\nneighbour, but without holding a reference on it. A reference is only\ntaken when the neighbour is used by a nexthop.\n\nFix by simplifying the reference counting scheme. Always take a\nreference when storing a neighbour pointer in a neighbour entry. Avoid\ntaking a referencing when the neighbour is used by a nexthop as the\nneighbour entry associated with the nexthop already holds a reference.\n\nTested by running the test that uncovered the problem over 300 times.\nWithout this patch the problem was reproduced after a handful of\niterations.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x2d4/0x310\nRead of size 8 at addr ffff88817f8e3420 by task ip/3929\n\nCPU: 3 UID: 0 PID: 3929 Comm: ip Not tainted 6.18.0-rc4-virtme-g36b21a067510 #3 PREEMPT(full)\nHardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_address_description.constprop.0+0x6e/0x300\n print_report+0xfc/0x1fb\n kasan_report+0xe4/0x110\n mlxsw_sp_neigh_entry_update+0x2d4/0x310\n mlxsw_sp_router_rif_gone_sync+0x35f/0x510\n mlxsw_sp_rif_destroy+0x1ea/0x730\n mlxsw_sp_inetaddr_port_vlan_event+0xa1/0x1b0\n __mlxsw_sp_inetaddr_lag_event+0xcc/0x130\n __mlxsw_sp_inetaddr_event+0xf5/0x3c0\n mlxsw_sp_router_netdevice_event+0x1015/0x1580\n notifier_call_chain+0xcc/0x150\n call_netdevice_notifiers_info+0x7e/0x100\n __netdev_upper_dev_unlink+0x10b/0x210\n netdev_upper_dev_unlink+0x79/0xa0\n vrf_del_slave+0x18/0x50\n do_set_master+0x146/0x7d0\n do_setlink.isra.0+0x9a0/0x2880\n rtnl_newlink+0x637/0xb20\n rtnetlink_rcv_msg+0x6fe/0xb90\n netlink_rcv_skb+0x123/0x380\n netlink_unicast+0x4a3/0x770\n netlink_sendmsg+0x75b/0xc90\n __sock_sendmsg+0xbe/0x160\n ____sys_sendmsg+0x5b2/0x7d0\n ___sys_sendmsg+0xfd/0x180\n __sys_sendmsg+0x124/0x1c0\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[...]\n\nAllocated by task 109:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7b/0x90\n __kmalloc_noprof+0x2c1/0x790\n neigh_alloc+0x6af/0x8f0\n ___neigh_create+0x63/0xe90\n mlxsw_sp_nexthop_neigh_init+0x430/0x7e0\n mlxsw_sp_nexthop_type_init+0x212/0x960\n mlxsw_sp_nexthop6_group_info_init.constprop.0+0x81f/0x1280\n mlxsw_sp_nexthop6_group_get+0x392/0x6a0\n mlxsw_sp_fib6_entry_create+0x46a/0xfd0\n mlxsw_sp_router_fib6_replace+0x1ed/0x5f0\n mlxsw_sp_router_fib6_event_work+0x10a/0x2a0\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20\n\nFreed by task 154:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_save_free_info+0x3b/0x60\n __kasan_slab_free+0x43/0x70\n kmem_cache_free_bulk.part.0+0x1eb/0x5e0\n kvfree_rcu_bulk+0x1f2/0x260\n kfree_rcu_work+0x130/0x1b0\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20\n\nLast potentially related work creation:\n kasan_save_stack+0x30/0x50\n kasan_record_aux_stack+0x8c/0xa0\n kvfree_call_rcu+0x93/0x5b0\n mlxsw_sp_router_neigh_event_work+0x67d/0x860\n process_one_work+0xd57/0x1390\n worker_thread+0x4d6/0xd40\n kthread+0x355/0x5b0\n ret_from_fork+0x1d4/0x270\n ret_from_fork_asm+0x11/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68801",
"url": "https://www.suse.com/security/cve/CVE-2025-68801"
},
{
"category": "external",
"summary": "SUSE Bug 1256653 for CVE-2025-68801",
"url": "https://bugzilla.suse.com/1256653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68801"
},
{
"cve": "CVE-2025-68802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68802"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Limit num_syncs to prevent oversized allocations\n\nThe exec and vm_bind ioctl allow userspace to specify an arbitrary\nnum_syncs value. Without bounds checking, a very large num_syncs\ncan force an excessively large allocation, leading to kernel warnings\nfrom the page allocator as below.\n\nIntroduce DRM_XE_MAX_SYNCS (set to 1024) and reject any request\nexceeding this limit.\n\n\"\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 1217 at mm/page_alloc.c:5124 __alloc_frozen_pages_noprof+0x2f8/0x2180 mm/page_alloc.c:5124\n...\nCall Trace:\n \u003cTASK\u003e\n alloc_pages_mpol+0xe4/0x330 mm/mempolicy.c:2416\n ___kmalloc_large_node+0xd8/0x110 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0xe0 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kmalloc_noprof+0x3d4/0x4b0 mm/slub.c:4388\n kmalloc_noprof include/linux/slab.h:909 [inline]\n kmalloc_array_noprof include/linux/slab.h:948 [inline]\n xe_exec_ioctl+0xa47/0x1e70 drivers/gpu/drm/xe/xe_exec.c:158\n drm_ioctl_kernel+0x1f1/0x3e0 drivers/gpu/drm/drm_ioctl.c:797\n drm_ioctl+0x5e7/0xc50 drivers/gpu/drm/drm_ioctl.c:894\n xe_drm_ioctl+0x10b/0x170 drivers/gpu/drm/xe/xe_device.c:224\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xbb/0x380 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\"\n\nv2: Add \"Reported-by\" and Cc stable kernels.\nv3: Change XE_MAX_SYNCS from 64 to 1024. (Matt \u0026 Ashutosh)\nv4: s/XE_MAX_SYNCS/DRM_XE_MAX_SYNCS/ (Matt)\nv5: Do the check at the top of the exec func. (Matt)\n\n(cherry picked from commit b07bac9bd708ec468cd1b8a5fe70ae2ac9b0a11c)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68802",
"url": "https://www.suse.com/security/cve/CVE-2025-68802"
},
{
"category": "external",
"summary": "SUSE Bug 1256661 for CVE-2025-68802",
"url": "https://bugzilla.suse.com/1256661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2025-68802"
},
{
"cve": "CVE-2025-68803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: NFSv4 file creation neglects setting ACL\n\nAn NFSv4 client that sets an ACL with a named principal during file\ncreation retrieves the ACL afterwards, and finds that it is only a\ndefault ACL (based on the mode bits) and not the ACL that was\nrequested during file creation. This violates RFC 8881 section\n6.4.1.3: \"the ACL attribute is set as given\".\n\nThe issue occurs in nfsd_create_setattr(), which calls\nnfsd_attrs_valid() to determine whether to call nfsd_setattr().\nHowever, nfsd_attrs_valid() checks only for iattr changes and\nsecurity labels, but not POSIX ACLs. When only an ACL is present,\nthe function returns false, nfsd_setattr() is skipped, and the\nPOSIX ACL is never applied to the inode.\n\nSubsequently, when the client retrieves the ACL, the server finds\nno POSIX ACL on the inode and returns one generated from the file\u0027s\nmode bits rather than returning the originally-specified ACL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68803",
"url": "https://www.suse.com/security/cve/CVE-2025-68803"
},
{
"category": "external",
"summary": "SUSE Bug 1256770 for CVE-2025-68803",
"url": "https://bugzilla.suse.com/1256770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68803"
},
{
"cve": "CVE-2025-68804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68804"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver\n\nAfter unbinding the driver, another kthread `cros_ec_console_log_work`\nis still accessing the device, resulting an UAF and crash.\n\nThe driver doesn\u0027t unregister the EC device in .remove() which should\nshutdown sub-devices synchronously. Fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68804",
"url": "https://www.suse.com/security/cve/CVE-2025-68804"
},
{
"category": "external",
"summary": "SUSE Bug 1256617 for CVE-2025-68804",
"url": "https://bugzilla.suse.com/1256617"
},
{
"category": "external",
"summary": "SUSE Bug 1256618 for CVE-2025-68804",
"url": "https://bugzilla.suse.com/1256618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-68804"
},
{
"cve": "CVE-2025-68808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68808"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: initialize local pointers upon transfer of memory ownership\n\nvidtv_channel_si_init() creates a temporary list (program, service, event)\nand ownership of the memory itself is transferred to the PAT/SDT/EIT\ntables through vidtv_psi_pat_program_assign(),\nvidtv_psi_sdt_service_assign(), vidtv_psi_eit_event_assign().\n\nThe problem here is that the local pointer where the memory ownership\ntransfer was completed is not initialized to NULL. This causes the\nvidtv_psi_pmt_create_sec_for_each_pat_entry() function to fail, and\nin the flow that jumps to free_eit, the memory that was freed by\nvidtv_psi_*_table_destroy() can be accessed again by\nvidtv_psi_*_event_destroy() due to the uninitialized local pointer, so it\nis freed once again.\n\nTherefore, to prevent use-after-free and double-free vulnerability,\nlocal pointers must be initialized to NULL when transferring memory\nownership.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68808",
"url": "https://www.suse.com/security/cve/CVE-2025-68808"
},
{
"category": "external",
"summary": "SUSE Bug 1256682 for CVE-2025-68808",
"url": "https://bugzilla.suse.com/1256682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68808"
},
{
"cve": "CVE-2025-68813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix ipv4 null-ptr-deref in route error path\n\nThe IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()\nwithout ensuring skb-\u003edev is set, leading to a NULL pointer dereference\nin fib_compute_spec_dst() when ipv4_link_failure() attempts to send\nICMP destination unreachable messages.\n\nThe issue emerged after commit ed0de45a1008 (\"ipv4: recompile ip options\nin ipv4_link_failure\") started calling __ip_options_compile() from\nipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()\nwhich dereferences skb-\u003edev. An attempt was made to fix the NULL skb-\u003edev\ndereference in commit 0113d9c9d1cc (\"ipv4: fix null-deref in\nipv4_link_failure\"), but it only addressed the immediate dev_net(skb-\u003edev)\ndereference by using a fallback device. The fix was incomplete because\nfib_compute_spec_dst() later in the call chain still accesses skb-\u003edev\ndirectly, which remains NULL when IPVS calls dst_link_failure().\n\nThe crash occurs when:\n1. IPVS processes a packet in NAT mode with a misconfigured destination\n2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route\n3. The error path calls dst_link_failure(skb) with skb-\u003edev == NULL\n4. ipv4_link_failure() -\u003e ipv4_send_dest_unreach() -\u003e\n __ip_options_compile() -\u003e fib_compute_spec_dst()\n5. fib_compute_spec_dst() dereferences NULL skb-\u003edev\n\nApply the same fix used for IPv6 in commit 326bf17ea5d4 (\"ipvs: fix\nipv6 route unreach panic\"): set skb-\u003edev from skb_dst(skb)-\u003edev before\ncalling dst_link_failure().\n\nKASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]\nCPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2\nRIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233\nRIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285\nCall Trace:\n \u003cTASK\u003e\n spec_dst_fill net/ipv4/ip_options.c:232\n spec_dst_fill net/ipv4/ip_options.c:229\n __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330\n ipv4_send_dest_unreach net/ipv4/route.c:1252\n ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265\n dst_link_failure include/net/dst.h:437\n __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412\n ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68813",
"url": "https://www.suse.com/security/cve/CVE-2025-68813"
},
{
"category": "external",
"summary": "SUSE Bug 1256641 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "external",
"summary": "SUSE Bug 1256644 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-68813"
},
{
"cve": "CVE-2025-68814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68814"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix filename leak in __io_openat_prep()\n\n __io_openat_prep() allocates a struct filename using getname(). However,\nfor the condition of the file being installed in the fixed file table as\nwell as having O_CLOEXEC flag set, the function returns early. At that\npoint, the request doesn\u0027t have REQ_F_NEED_CLEANUP flag set. Due to this,\nthe memory for the newly allocated struct filename is not cleaned up,\ncausing a memory leak.\n\nFix this by setting the REQ_F_NEED_CLEANUP for the request just after the\nsuccessful getname() call, so that when the request is torn down, the\nfilename will be cleaned up, along with other resources needing cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68814",
"url": "https://www.suse.com/security/cve/CVE-2025-68814"
},
{
"category": "external",
"summary": "SUSE Bug 1256651 for CVE-2025-68814",
"url": "https://bugzilla.suse.com/1256651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68814"
},
{
"cve": "CVE-2025-68815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68815"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Remove drr class from the active list if it changes to strict\n\nWhenever a user issues an ets qdisc change command, transforming a\ndrr class into a strict one, the ets code isn\u0027t checking whether that\nclass was in the active list and removing it. This means that, if a\nuser changes a strict class (which was in the active list) back to a drr\none, that class will be added twice to the active list [1].\n\nDoing so with the following commands:\n\ntc qdisc add dev lo root handle 1: ets bands 2 strict 1\ntc qdisc add dev lo parent 1:2 handle 20: \\\n tbf rate 8bit burst 100b latency 1s\ntc filter add dev lo parent 1: basic classid 1:2\nping -c1 -W0.01 -s 56 127.0.0.1\ntc qdisc change dev lo root handle 1: ets bands 2 strict 2\ntc qdisc change dev lo root handle 1: ets bands 2 strict 1\nping -c1 -W0.01 -s 56 127.0.0.1\n\nWill trigger the following splat with list debug turned on:\n\n[ 59.279014][ T365] ------------[ cut here ]------------\n[ 59.279452][ T365] list_add double add: new=ffff88801d60e350, prev=ffff88801d60e350, next=ffff88801d60e2c0.\n[ 59.280153][ T365] WARNING: CPU: 3 PID: 365 at lib/list_debug.c:35 __list_add_valid_or_report+0x17f/0x220\n[ 59.280860][ T365] Modules linked in:\n[ 59.281165][ T365] CPU: 3 UID: 0 PID: 365 Comm: tc Not tainted 6.18.0-rc7-00105-g7e9f13163c13-dirty #239 PREEMPT(voluntary)\n[ 59.281977][ T365] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n[ 59.282391][ T365] RIP: 0010:__list_add_valid_or_report+0x17f/0x220\n[ 59.282842][ T365] Code: 89 c6 e8 d4 b7 0d ff 90 0f 0b 90 90 31 c0 e9 31 ff ff ff 90 48 c7 c7 e0 a0 22 9f 48 89 f2 48 89 c1 4c 89 c6 e8 b2 b7 0d ff 90 \u003c0f\u003e 0b 90 90 31 c0 e9 0f ff ff ff 48 89 f7 48 89 44 24 10 4c 89 44\n...\n[ 59.288812][ T365] Call Trace:\n[ 59.289056][ T365] \u003cTASK\u003e\n[ 59.289224][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.289546][ T365] ets_qdisc_change+0xd2b/0x1e80\n[ 59.289891][ T365] ? __lock_acquire+0x7e7/0x1be0\n[ 59.290223][ T365] ? __pfx_ets_qdisc_change+0x10/0x10\n[ 59.290546][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.290898][ T365] ? __mutex_trylock_common+0xda/0x240\n[ 59.291228][ T365] ? __pfx___mutex_trylock_common+0x10/0x10\n[ 59.291655][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.291993][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.292313][ T365] ? trace_contention_end+0xc8/0x110\n[ 59.292656][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.293022][ T365] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 59.293351][ T365] tc_modify_qdisc+0x63a/0x1cf0\n\nFix this by always checking and removing an ets class from the active list\nwhen changing it to strict.\n\n[1] https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/tree/net/sched/sch_ets.c?id=ce052b9402e461a9aded599f5b47e76bc727f7de#n663",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68815",
"url": "https://www.suse.com/security/cve/CVE-2025-68815"
},
{
"category": "external",
"summary": "SUSE Bug 1256680 for CVE-2025-68815",
"url": "https://bugzilla.suse.com/1256680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68815"
},
{
"cve": "CVE-2025-68816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68816"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fw_tracer, Validate format string parameters\n\nAdd validation for format string parameters in the firmware tracer to\nprevent potential security vulnerabilities and crashes from malformed\nformat strings received from firmware.\n\nThe firmware tracer receives format strings from the device firmware and\nuses them to format trace messages. Without proper validation, bad\nfirmware could provide format strings with invalid format specifiers\n(e.g., %s, %p, %n) that could lead to crashes, or other undefined\nbehavior.\n\nAdd mlx5_tracer_validate_params() to validate that all format specifiers\nin trace strings are limited to safe integer/hex formats (%x, %d, %i,\n%u, %llx, %lx, etc.). Reject strings containing other format types that\ncould be used to access arbitrary memory or cause crashes.\nInvalid format strings are added to the trace output for visibility with\n\"BAD_FORMAT: \" prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68816",
"url": "https://www.suse.com/security/cve/CVE-2025-68816"
},
{
"category": "external",
"summary": "SUSE Bug 1256674 for CVE-2025-68816",
"url": "https://bugzilla.suse.com/1256674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68816"
},
{
"cve": "CVE-2025-68819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()\n\nrlen value is a user-controlled value, but dtv5100_i2c_msg() does not\ncheck the size of the rlen value. Therefore, if it is set to a value\nlarger than sizeof(st-\u003edata), an out-of-bounds vuln occurs for st-\u003edata.\n\nTherefore, we need to add proper range checking to prevent this vuln.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68819",
"url": "https://www.suse.com/security/cve/CVE-2025-68819"
},
{
"category": "external",
"summary": "SUSE Bug 1256664 for CVE-2025-68819",
"url": "https://bugzilla.suse.com/1256664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68819"
},
{
"cve": "CVE-2025-68820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68820"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: xattr: fix null pointer deref in ext4_raw_inode()\n\nIf ext4_get_inode_loc() fails (e.g. if it returns -EFSCORRUPTED),\niloc.bh will remain set to NULL. Since ext4_xattr_inode_dec_ref_all()\nlacks error checking, this will lead to a null pointer dereference\nin ext4_raw_inode(), called right after ext4_get_inode_loc().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68820",
"url": "https://www.suse.com/security/cve/CVE-2025-68820"
},
{
"category": "external",
"summary": "SUSE Bug 1256754 for CVE-2025-68820",
"url": "https://bugzilla.suse.com/1256754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-68820"
},
{
"cve": "CVE-2025-71064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: using the num_tqps in the vf driver to apply for resources\n\nCurrently, hdev-\u003ehtqp is allocated using hdev-\u003enum_tqps, and kinfo-\u003etqp\nis allocated using kinfo-\u003enum_tqps. However, kinfo-\u003enum_tqps is set to\nmin(new_tqps, hdev-\u003enum_tqps); Therefore, kinfo-\u003enum_tqps may be smaller\nthan hdev-\u003enum_tqps, which causes some hdev-\u003ehtqp[i] to remain\nuninitialized in hclgevf_knic_setup().\n\nThus, this patch allocates hdev-\u003ehtqp and kinfo-\u003etqp using hdev-\u003enum_tqps,\nensuring that the lengths of hdev-\u003ehtqp and kinfo-\u003etqp are consistent\nand that all elements are properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71064",
"url": "https://www.suse.com/security/cve/CVE-2025-71064"
},
{
"category": "external",
"summary": "SUSE Bug 1256654 for CVE-2025-71064",
"url": "https://bugzilla.suse.com/1256654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71064"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/oa: Limit num_syncs to prevent oversized allocations\n\nThe OA open parameters did not validate num_syncs, allowing\nuserspace to pass arbitrarily large values, potentially\nleading to excessive allocations.\n\nAdd check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS,\nreturning -EINVAL when the limit is violated.\n\nv2: use XE_IOCTL_DBG() and drop duplicated check. (Ashutosh)\n\n(cherry picked from commit e057b2d2b8d815df3858a87dffafa2af37e5945b)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71076",
"url": "https://www.suse.com/security/cve/CVE-2025-71076"
},
{
"category": "external",
"summary": "SUSE Bug 1256627 for CVE-2025-71076",
"url": "https://bugzilla.suse.com/1256627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71076"
},
{
"cve": "CVE-2025-71077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71077"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Cap the number of PCR banks\n\ntpm2_get_pcr_allocation() does not cap any upper limit for the number of\nbanks. Cap the limit to eight banks so that out of bounds values coming\nfrom external I/O cause on only limited harm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71077",
"url": "https://www.suse.com/security/cve/CVE-2025-71077"
},
{
"category": "external",
"summary": "SUSE Bug 1256613 for CVE-2025-71077",
"url": "https://bugzilla.suse.com/1256613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71077"
},
{
"cve": "CVE-2025-71078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s/slb: Fix SLB multihit issue during SLB preload\n\nOn systems using the hash MMU, there is a software SLB preload cache that\nmirrors the entries loaded into the hardware SLB buffer. This preload\ncache is subject to periodic eviction - typically after every 256 context\nswitches - to remove old entry.\n\nTo optimize performance, the kernel skips switch_mmu_context() in\nswitch_mm_irqs_off() when the prev and next mm_struct are the same.\nHowever, on hash MMU systems, this can lead to inconsistencies between\nthe hardware SLB and the software preload cache.\n\nIf an SLB entry for a process is evicted from the software cache on one\nCPU, and the same process later runs on another CPU without executing\nswitch_mmu_context(), the hardware SLB may retain stale entries. If the\nkernel then attempts to reload that entry, it can trigger an SLB\nmulti-hit error.\n\nThe following timeline shows how stale SLB entries are created and can\ncause a multi-hit error when a process moves between CPUs without a\nMMU context switch.\n\nCPU 0 CPU 1\n----- -----\nProcess P\nexec swapper/1\n load_elf_binary\n begin_new_exc\n activate_mm\n switch_mm_irqs_off\n switch_mmu_context\n switch_slb\n /*\n * This invalidates all\n * the entries in the HW\n * and setup the new HW\n * SLB entries as per the\n * preload cache.\n */\ncontext_switch\nsched_migrate_task migrates process P to cpu-1\n\nProcess swapper/0 context switch (to process P)\n(uses mm_struct of Process P) switch_mm_irqs_off()\n switch_slb\n load_slb++\n /*\n * load_slb becomes 0 here\n * and we evict an entry from\n * the preload cache with\n * preload_age(). We still\n * keep HW SLB and preload\n * cache in sync, that is\n * because all HW SLB entries\n * anyways gets evicted in\n * switch_slb during SLBIA.\n * We then only add those\n * entries back in HW SLB,\n * which are currently\n * present in preload_cache\n * (after eviction).\n */\n load_elf_binary continues...\n setup_new_exec()\n slb_setup_new_exec()\n\n sched_switch event\n sched_migrate_task migrates\n process P to cpu-0\n\ncontext_switch from swapper/0 to Process P\n switch_mm_irqs_off()\n /*\n * Since both prev and next mm struct are same we don\u0027t call\n * switch_mmu_context(). This will cause the HW SLB and SW preload\n * cache to go out of sync in preload_new_slb_context. Because there\n * was an SLB entry which was evicted from both HW and preload cache\n * on cpu-1. Now later in preload_new_slb_context(), when we will try\n * to add the same preload entry again, we will add this to the SW\n * preload cache and then will add it to the HW SLB. Since on cpu-0\n * this entry was never invalidated, hence adding this entry to the HW\n * SLB will cause a SLB multi-hit error.\n */\nload_elf_binary cont\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71078",
"url": "https://www.suse.com/security/cve/CVE-2025-71078"
},
{
"category": "external",
"summary": "SUSE Bug 1256616 for CVE-2025-71078",
"url": "https://bugzilla.suse.com/1256616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71078"
},
{
"cve": "CVE-2025-71079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71079"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write\n\nA deadlock can occur between nfc_unregister_device() and rfkill_fop_write()\ndue to lock ordering inversion between device_lock and rfkill_global_mutex.\n\nThe problematic lock order is:\n\nThread A (rfkill_fop_write):\n rfkill_fop_write()\n mutex_lock(\u0026rfkill_global_mutex)\n rfkill_set_block()\n nfc_rfkill_set_block()\n nfc_dev_down()\n device_lock(\u0026dev-\u003edev) \u003c- waits for device_lock\n\nThread B (nfc_unregister_device):\n nfc_unregister_device()\n device_lock(\u0026dev-\u003edev)\n rfkill_unregister()\n mutex_lock(\u0026rfkill_global_mutex) \u003c- waits for rfkill_global_mutex\n\nThis creates a classic ABBA deadlock scenario.\n\nFix this by moving rfkill_unregister() and rfkill_destroy() outside the\ndevice_lock critical section. Store the rfkill pointer in a local variable\nbefore releasing the lock, then call rfkill_unregister() after releasing\ndevice_lock.\n\nThis change is safe because rfkill_fop_write() holds rfkill_global_mutex\nwhile calling the rfkill callbacks, and rfkill_unregister() also acquires\nrfkill_global_mutex before cleanup. Therefore, rfkill_unregister() will\nwait for any ongoing callback to complete before proceeding, and\ndevice_del() is only called after rfkill_unregister() returns, preventing\nany use-after-free.\n\nThe similar lock ordering in nfc_register_device() (device_lock -\u003e\nrfkill_global_mutex via rfkill_register) is safe because during\nregistration the device is not yet in rfkill_list, so no concurrent\nrfkill operations can occur on this device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71079",
"url": "https://www.suse.com/security/cve/CVE-2025-71079"
},
{
"category": "external",
"summary": "SUSE Bug 1256619 for CVE-2025-71079",
"url": "https://bugzilla.suse.com/1256619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71079"
},
{
"cve": "CVE-2025-71080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT\n\nOn PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the\ncurrent task can be preempted. Another task running on the same CPU\nmay then execute rt6_make_pcpu_route() and successfully install a\npcpu_rt entry. When the first task resumes execution, its cmpxchg()\nin rt6_make_pcpu_route() will fail because rt6i_pcpu is no longer\nNULL, triggering the BUG_ON(prev). It\u0027s easy to reproduce it by adding\nmdelay() after rt6_get_pcpu_route().\n\nUsing preempt_disable/enable is not appropriate here because\nip6_rt_pcpu_alloc() may sleep.\n\nFix this by handling the cmpxchg() failure gracefully on PREEMPT_RT:\nfree our allocation and return the existing pcpu_rt installed by\nanother task. The BUG_ON is replaced by WARN_ON_ONCE for non-PREEMPT_RT\nkernels where such races should not occur.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71080",
"url": "https://www.suse.com/security/cve/CVE-2025-71080"
},
{
"category": "external",
"summary": "SUSE Bug 1256608 for CVE-2025-71080",
"url": "https://bugzilla.suse.com/1256608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2025-71080"
},
{
"cve": "CVE-2025-71081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: stm32: sai: fix OF node leak on probe\n\nThe reference taken to the sync provider OF node when probing the\nplatform device is currently only dropped if the set_sync() callback\nfails during DAI probe.\n\nMake sure to drop the reference on platform probe failures (e.g. probe\ndeferral) and on driver unbind.\n\nThis also avoids a potential use-after-free in case the DAI is ever\nreprobed without first rebinding the platform driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71081",
"url": "https://www.suse.com/security/cve/CVE-2025-71081"
},
{
"category": "external",
"summary": "SUSE Bug 1256609 for CVE-2025-71081",
"url": "https://bugzilla.suse.com/1256609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71081"
},
{
"cve": "CVE-2025-71082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: revert use of devm_kzalloc in btusb\n\nThis reverts commit 98921dbd00c4e (\"Bluetooth: Use devm_kzalloc in\nbtusb.c file\").\n\nIn btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This\nties the lifetime of all the btusb data to the binding of a driver to\none interface, INTF. In a driver that binds to other interfaces, ISOC\nand DIAG, this is an accident waiting to happen.\n\nThe issue is revealed in btusb_disconnect(), where calling\nusb_driver_release_interface(\u0026btusb_driver, data-\u003eintf) will have devm\nfree the data that is also being used by the other interfaces of the\ndriver that may not be released yet.\n\nTo fix this, revert the use of devm and go back to freeing memory\nexplicitly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71082",
"url": "https://www.suse.com/security/cve/CVE-2025-71082"
},
{
"category": "external",
"summary": "SUSE Bug 1256611 for CVE-2025-71082",
"url": "https://bugzilla.suse.com/1256611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71082"
},
{
"cve": "CVE-2025-71083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Avoid NULL pointer deref for evicted BOs\n\nIt is possible for a BO to exist that is not currently associated with a\nresource, e.g. because it has been evicted.\n\nWhen devcoredump tries to read the contents of all BOs for dumping, we need\nto expect this as well -- in this case, ENODATA is recorded instead of the\nbuffer contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71083",
"url": "https://www.suse.com/security/cve/CVE-2025-71083"
},
{
"category": "external",
"summary": "SUSE Bug 1256610 for CVE-2025-71083",
"url": "https://bugzilla.suse.com/1256610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71083"
},
{
"cve": "CVE-2025-71084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cm: Fix leaking the multicast GID table reference\n\nIf the CM ID is destroyed while the CM event for multicast creating is\nstill queued the cancel_work_sync() will prevent the work from running\nwhich also prevents destroying the ah_attr. This leaks a refcount and\ntriggers a WARN:\n\n GID entry ref leak for dev syz1 index 2 ref=573\n WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]\n WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886\n\nDestroy the ah_attr after canceling the work, it is safe to call this\ntwice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71084",
"url": "https://www.suse.com/security/cve/CVE-2025-71084"
},
{
"category": "external",
"summary": "SUSE Bug 1256622 for CVE-2025-71084",
"url": "https://bugzilla.suse.com/1256622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2025-71084"
},
{
"cve": "CVE-2025-71085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()\n\nThere exists a kernel oops caused by a BUG_ON(nhead \u003c 0) at\nnet/core/skbuff.c:2232 in pskb_expand_head().\nThis bug is triggered as part of the calipso_skbuff_setattr()\nroutine when skb_cow() is passed headroom \u003e INT_MAX\n(i.e. (int)(skb_headroom(skb) + len_delta) \u003c 0).\n\nThe root cause of the bug is due to an implicit integer cast in\n__skb_cow(). The check (headroom \u003e skb_headroom(skb)) is meant to ensure\nthat delta = headroom - skb_headroom(skb) is never negative, otherwise\nwe will trigger a BUG_ON in pskb_expand_head(). However, if\nheadroom \u003e INT_MAX and delta \u003c= -NET_SKB_PAD, the check passes, delta\nbecomes negative, and pskb_expand_head() is passed a negative value for\nnhead.\n\nFix the trigger condition in calipso_skbuff_setattr(). Avoid passing\n\"negative\" headroom sizes to skb_cow() within calipso_skbuff_setattr()\nby only using skb_cow() to grow headroom.\n\nPoC:\n\tUsing `netlabelctl` tool:\n\n netlabelctl map del default\n netlabelctl calipso add pass doi:7\n netlabelctl map add default address:0::1/128 protocol:calipso,7\n\n Then run the following PoC:\n\n int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\n // setup msghdr\n int cmsg_size = 2;\n int cmsg_len = 0x60;\n struct msghdr msg;\n struct sockaddr_in6 dest_addr;\n struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,\n sizeof(struct cmsghdr) + cmsg_len);\n msg.msg_name = \u0026dest_addr;\n msg.msg_namelen = sizeof(dest_addr);\n msg.msg_iov = NULL;\n msg.msg_iovlen = 0;\n msg.msg_control = cmsg;\n msg.msg_controllen = cmsg_len;\n msg.msg_flags = 0;\n\n // setup sockaddr\n dest_addr.sin6_family = AF_INET6;\n dest_addr.sin6_port = htons(31337);\n dest_addr.sin6_flowinfo = htonl(31337);\n dest_addr.sin6_addr = in6addr_loopback;\n dest_addr.sin6_scope_id = 31337;\n\n // setup cmsghdr\n cmsg-\u003ecmsg_len = cmsg_len;\n cmsg-\u003ecmsg_level = IPPROTO_IPV6;\n cmsg-\u003ecmsg_type = IPV6_HOPOPTS;\n char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);\n hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80\n\n sendmsg(fd, \u0026msg, 0);",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71085",
"url": "https://www.suse.com/security/cve/CVE-2025-71085"
},
{
"category": "external",
"summary": "SUSE Bug 1256623 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "external",
"summary": "SUSE Bug 1256624 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71085"
},
{
"cve": "CVE-2025-71086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rose: fix invalid array index in rose_kill_by_device()\n\nrose_kill_by_device() collects sockets into a local array[] and then\niterates over them to disconnect sockets bound to a device being brought\ndown.\n\nThe loop mistakenly indexes array[cnt] instead of array[i]. For cnt \u003c\nARRAY_SIZE(array), this reads an uninitialized entry; for cnt ==\nARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to\nan invalid socket pointer dereference and also leaks references taken\nvia sock_hold().\n\nFix the index to use i.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71086",
"url": "https://www.suse.com/security/cve/CVE-2025-71086"
},
{
"category": "external",
"summary": "SUSE Bug 1256625 for CVE-2025-71086",
"url": "https://bugzilla.suse.com/1256625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71086"
},
{
"cve": "CVE-2025-71087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: fix off-by-one issues in iavf_config_rss_reg()\n\nThere are off-by-one bugs when configuring RSS hash key and lookup\ntable, causing out-of-bounds reads to memory [1] and out-of-bounds\nwrites to device registers.\n\nBefore commit 43a3d9ba34c9 (\"i40evf: Allow PF driver to configure RSS\"),\nthe loop upper bounds were:\n i \u003c= I40E_VFQF_{HKEY,HLUT}_MAX_INDEX\nwhich is safe since the value is the last valid index.\n\nThat commit changed the bounds to:\n i \u003c= adapter-\u003erss_{key,lut}_size / 4\nwhere `rss_{key,lut}_size / 4` is the number of dwords, so the last\nvalid index is `(rss_{key,lut}_size / 4) - 1`. Therefore, using `\u003c=`\naccesses one element past the end.\n\nFix the issues by using `\u003c` instead of `\u003c=`, ensuring we do not exceed\nthe bounds.\n\n[1] KASAN splat about rss_key_size off-by-one\n BUG: KASAN: slab-out-of-bounds in iavf_config_rss+0x619/0x800\n Read of size 4 at addr ffff888102c50134 by task kworker/u8:6/63\n\n CPU: 0 UID: 0 PID: 63 Comm: kworker/u8:6 Not tainted 6.18.0-rc2-enjuk-tnguy-00378-g3005f5b77652-dirty #156 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n Workqueue: iavf iavf_watchdog_task\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xb0\n print_report+0x170/0x4f3\n kasan_report+0xe1/0x1a0\n iavf_config_rss+0x619/0x800\n iavf_watchdog_task+0x2be7/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\n Allocated by task 63:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x246/0x6f0\n iavf_watchdog_task+0x28fc/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n\n The buggy address belongs to the object at ffff888102c50100\n which belongs to the cache kmalloc-64 of size 64\n The buggy address is located 0 bytes to the right of\n allocated 52-byte region [ffff888102c50100, ffff888102c50134)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c50\n flags: 0x200000000000000(node=0|zone=2)\n page_type: f5(slab)\n raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888102c50000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n ffff888102c50080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n \u003effff888102c50100: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ^\n ffff888102c50180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc\n ffff888102c50200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71087",
"url": "https://www.suse.com/security/cve/CVE-2025-71087"
},
{
"category": "external",
"summary": "SUSE Bug 1256628 for CVE-2025-71087",
"url": "https://bugzilla.suse.com/1256628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71087"
},
{
"cve": "CVE-2025-71088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fallback earlier on simult connection\n\nSyzkaller reports a simult-connect race leading to inconsistent fallback\nstatus:\n\n WARNING: CPU: 3 PID: 33 at net/mptcp/subflow.c:1515 subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515\n Modules linked in:\n CPU: 3 UID: 0 PID: 33 Comm: ksoftirqd/3 Not tainted syzkaller #0 PREEMPT(full)\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n RIP: 0010:subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515\n Code: 89 ee e8 78 61 3c f6 40 84 ed 75 21 e8 8e 66 3c f6 44 89 fe bf 07 00 00 00 e8 c1 61 3c f6 41 83 ff 07 74 09 e8 76 66 3c f6 90 \u003c0f\u003e 0b 90 e8 6d 66 3c f6 48 89 df e8 e5 ad ff ff 31 ff 89 c5 89 c6\n RSP: 0018:ffffc900006cf338 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888031acd100 RCX: ffffffff8b7f2abf\n RDX: ffff88801e6ea440 RSI: ffffffff8b7f2aca RDI: 0000000000000005\n RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000007\n R10: 0000000000000004 R11: 0000000000002c10 R12: ffff88802ba69900\n R13: 1ffff920000d9e67 R14: ffff888046f81800 R15: 0000000000000004\n FS: 0000000000000000(0000) GS:ffff8880d69bc000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000560fc0ca1670 CR3: 0000000032c3a000 CR4: 0000000000352ef0\n Call Trace:\n \u003cTASK\u003e\n tcp_data_queue+0x13b0/0x4f90 net/ipv4/tcp_input.c:5197\n tcp_rcv_state_process+0xfdf/0x4ec0 net/ipv4/tcp_input.c:6922\n tcp_v6_do_rcv+0x492/0x1740 net/ipv6/tcp_ipv6.c:1672\n tcp_v6_rcv+0x2976/0x41e0 net/ipv6/tcp_ipv6.c:1918\n ip6_protocol_deliver_rcu+0x188/0x1520 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1e4/0x4b0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ip6_input+0x105/0x2f0 net/ipv6/ip6_input.c:500\n dst_input include/net/dst.h:471 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n NF_HOOK include/linux/netfilter.h:318 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5979\n __netif_receive_skb+0x1d/0x160 net/core/dev.c:6092\n process_backlog+0x442/0x15e0 net/core/dev.c:6444\n __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7494\n napi_poll net/core/dev.c:7557 [inline]\n net_rx_action+0xa9f/0xfe0 net/core/dev.c:7684\n handle_softirqs+0x216/0x8e0 kernel/softirq.c:579\n run_ksoftirqd kernel/softirq.c:968 [inline]\n run_ksoftirqd+0x3a/0x60 kernel/softirq.c:960\n smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160\n kthread+0x3c2/0x780 kernel/kthread.c:463\n ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \u003c/TASK\u003e\n\nThe TCP subflow can process the simult-connect syn-ack packet after\ntransitioning to TCP_FIN1 state, bypassing the MPTCP fallback check,\nas the sk_state_change() callback is not invoked for * -\u003e FIN_WAIT1\ntransitions.\n\nThat will move the msk socket to an inconsistent status and the next\nincoming data will hit the reported splat.\n\nClose the race moving the simult-fallback check at the earliest possible\nstage - that is at syn-ack generation time.\n\nAbout the fixes tags: [2] was supposed to also fix this issue introduced\nby [3]. [1] is required as a dependence: it was not explicitly marked as\na fix, but it is one and it has already been backported before [3]. In\nother words, this commit should be backported up to [3], including [2]\nand [1] if that\u0027s not already there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71088",
"url": "https://www.suse.com/security/cve/CVE-2025-71088"
},
{
"category": "external",
"summary": "SUSE Bug 1256630 for CVE-2025-71088",
"url": "https://bugzilla.suse.com/1256630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71088"
},
{
"cve": "CVE-2025-71089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu: disable SVA when CONFIG_X86 is set\n\nPatch series \"Fix stale IOTLB entries for kernel address space\", v7.\n\nThis proposes a fix for a security vulnerability related to IOMMU Shared\nVirtual Addressing (SVA). In an SVA context, an IOMMU can cache kernel\npage table entries. When a kernel page table page is freed and\nreallocated for another purpose, the IOMMU might still hold stale,\nincorrect entries. This can be exploited to cause a use-after-free or\nwrite-after-free condition, potentially leading to privilege escalation or\ndata corruption.\n\nThis solution introduces a deferred freeing mechanism for kernel page\ntable pages, which provides a safe window to notify the IOMMU to\ninvalidate its caches before the page is reused.\n\n\nThis patch (of 8):\n\nIn the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware\nshares and walks the CPU\u0027s page tables. The x86 architecture maps the\nkernel\u0027s virtual address space into the upper portion of every process\u0027s\npage table. Consequently, in an SVA context, the IOMMU hardware can walk\nand cache kernel page table entries.\n\nThe Linux kernel currently lacks a notification mechanism for kernel page\ntable changes, specifically when page table pages are freed and reused. \nThe IOMMU driver is only notified of changes to user virtual address\nmappings. This can cause the IOMMU\u0027s internal caches to retain stale\nentries for kernel VA.\n\nUse-After-Free (UAF) and Write-After-Free (WAF) conditions arise when\nkernel page table pages are freed and later reallocated. The IOMMU could\nmisinterpret the new data as valid page table entries. The IOMMU might\nthen walk into attacker-controlled memory, leading to arbitrary physical\nmemory DMA access or privilege escalation. This is also a\nWrite-After-Free issue, as the IOMMU will potentially continue to write\nAccessed and Dirty bits to the freed memory while attempting to walk the\nstale page tables.\n\nCurrently, SVA contexts are unprivileged and cannot access kernel\nmappings. However, the IOMMU will still walk kernel-only page tables all\nthe way down to the leaf entries, where it realizes the mapping is for the\nkernel and errors out. This means the IOMMU still caches these\nintermediate page table entries, making the described vulnerability a real\nconcern.\n\nDisable SVA on x86 architecture until the IOMMU can receive notification\nto flush the paging cache before freeing the CPU kernel page table pages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71089",
"url": "https://www.suse.com/security/cve/CVE-2025-71089"
},
{
"category": "external",
"summary": "SUSE Bug 1256612 for CVE-2025-71089",
"url": "https://bugzilla.suse.com/1256612"
},
{
"category": "external",
"summary": "SUSE Bug 1256615 for CVE-2025-71089",
"url": "https://bugzilla.suse.com/1256615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71089"
},
{
"cve": "CVE-2025-71091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: fix check for port enabled in team_queue_override_port_prio_changed()\n\nThere has been a syzkaller bug reported recently with the following\ntrace:\n\nlist_del corruption, ffff888058bea080-\u003eprev is LIST_POISON2 (dead000000000122)\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:59!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59\nCode: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 \u003c0f\u003e 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d49f370 EFLAGS: 00010286\nRAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000\nRDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005\nRBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230\nR13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480\nFS: 00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n __list_del_entry_valid include/linux/list.h:132 [inline]\n __list_del_entry include/linux/list.h:223 [inline]\n list_del_rcu include/linux/rculist.h:178 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]\n team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]\n team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534\n team_option_set drivers/net/team/team_core.c:376 [inline]\n team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653\n genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg net/socket.c:742 [inline]\n ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630\n ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684\n __sys_sendmsg+0x16d/0x220 net/socket.c:2716\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe problem is in this flow:\n1) Port is enabled, queue_id != 0, in qom_list\n2) Port gets disabled\n -\u003e team_port_disable()\n -\u003e team_queue_override_port_del()\n -\u003e del (removed from list)\n3) Port is disabled, queue_id != 0, not in any list\n4) Priority changes\n -\u003e team_queue_override_port_prio_changed()\n -\u003e checks: port disabled \u0026\u0026 queue_id != 0\n -\u003e calls del - hits the BUG as it is removed already\n\nTo fix this, change the check in team_queue_override_port_prio_changed()\nso it returns early if port is not enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71091",
"url": "https://www.suse.com/security/cve/CVE-2025-71091"
},
{
"category": "external",
"summary": "SUSE Bug 1256773 for CVE-2025-71091",
"url": "https://bugzilla.suse.com/1256773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71091"
},
{
"cve": "CVE-2025-71093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ne1000: fix OOB in e1000_tbi_should_accept()\n\nIn e1000_tbi_should_accept() we read the last byte of the frame via\n\u0027data[length - 1]\u0027 to evaluate the TBI workaround. If the descriptor-\nreported length is zero or larger than the actual RX buffer size, this\nread goes out of bounds and can hit unrelated slab objects. The issue\nis observed from the NAPI receive path (e1000_clean_rx_irq):\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790\nRead of size 1 at addr ffff888014114e54 by task sshd/363\n\nCPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x5a/0x74\n print_address_description+0x7b/0x440\n print_report+0x101/0x200\n kasan_report+0xc1/0xf0\n e1000_tbi_should_accept+0x610/0x790\n e1000_clean_rx_irq+0xa8c/0x1110\n e1000_clean+0xde2/0x3c10\n __napi_poll+0x98/0x380\n net_rx_action+0x491/0xa20\n __do_softirq+0x2c9/0x61d\n do_softirq+0xd1/0x120\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0xfe/0x130\n ip_finish_output2+0x7d5/0xb00\n __ip_queue_xmit+0xe24/0x1ab0\n __tcp_transmit_skb+0x1bcb/0x3340\n tcp_write_xmit+0x175d/0x6bd0\n __tcp_push_pending_frames+0x7b/0x280\n tcp_sendmsg_locked+0x2e4f/0x32d0\n tcp_sendmsg+0x24/0x40\n sock_write_iter+0x322/0x430\n vfs_write+0x56c/0xa60\n ksys_write+0xd1/0x190\n do_syscall_64+0x43/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f511b476b10\nCode: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24\nRSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10\nRDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003\nRBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00\nR10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003\n \u003c/TASK\u003e\nAllocated by task 1:\n __kasan_krealloc+0x131/0x1c0\n krealloc+0x90/0xc0\n add_sysfs_param+0xcb/0x8a0\n kernel_add_sysfs_param+0x81/0xd4\n param_sysfs_builtin+0x138/0x1a6\n param_sysfs_init+0x57/0x5b\n do_one_initcall+0x104/0x250\n do_initcall_level+0x102/0x132\n do_initcalls+0x46/0x74\n kernel_init_freeable+0x28f/0x393\n kernel_init+0x14/0x1a0\n ret_from_fork+0x22/0x30\nThe buggy address belongs to the object at ffff888014114000\n which belongs to the cache kmalloc-2k of size 2048\nThe buggy address is located 1620 bytes to the right of\n 2048-byte region [ffff888014114000, ffff888014114800]\nThe buggy address belongs to the physical page:\npage:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110\nhead:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x100000000010200(slab|head|node=0|zone=1)\nraw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000\nraw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n==================================================================\n\nThis happens because the TBI check unconditionally dereferences the last\nbyte without validating the reported length first:\n\n\tu8 last_byte = *(data + length - 1);\n\nFix by rejecting the frame early if the length is zero, or if it exceeds\nadapter-\u003erx_buffer_len. This preserves the TBI workaround semantics for\nvalid frames and prevents touching memory beyond the RX buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71093",
"url": "https://www.suse.com/security/cve/CVE-2025-71093"
},
{
"category": "external",
"summary": "SUSE Bug 1256777 for CVE-2025-71093",
"url": "https://bugzilla.suse.com/1256777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71093"
},
{
"cve": "CVE-2025-71094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: validate PHY address before use\n\nThe ASIX driver reads the PHY address from the USB device via\nasix_read_phy_addr(). A malicious or faulty device can return an\ninvalid address (\u003e= PHY_MAX_ADDR), which causes a warning in\nmdiobus_get_phy():\n\n addr 207 out of range\n WARNING: drivers/net/phy/mdio_bus.c:76\n\nValidate the PHY address in asix_read_phy_addr() and remove the\nnow-redundant check in ax88172a.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71094",
"url": "https://www.suse.com/security/cve/CVE-2025-71094"
},
{
"category": "external",
"summary": "SUSE Bug 1256597 for CVE-2025-71094",
"url": "https://bugzilla.suse.com/1256597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "low"
}
],
"title": "CVE-2025-71094"
},
{
"cve": "CVE-2025-71095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix the crash issue for zero copy XDP_TX action\n\nThere is a crash issue when running zero copy XDP_TX action, the crash\nlog is shown below.\n\n[ 216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000\n[ 216.187524] Internal error: Oops: 0000000096000144 [#1] SMP\n[ 216.301694] Call trace:\n[ 216.304130] dcache_clean_poc+0x20/0x38 (P)\n[ 216.308308] __dma_sync_single_for_device+0x1bc/0x1e0\n[ 216.313351] stmmac_xdp_xmit_xdpf+0x354/0x400\n[ 216.317701] __stmmac_xdp_run_prog+0x164/0x368\n[ 216.322139] stmmac_napi_poll_rxtx+0xba8/0xf00\n[ 216.326576] __napi_poll+0x40/0x218\n[ 216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt\n\nFor XDP_TX action, the xdp_buff is converted to xdp_frame by\nxdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame\ndepends on the memory type of the xdp_buff. For page pool based xdp_buff\nit produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy\nXSK pool based xdp_buff it produces xdp_frame with memory type\nMEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the\nmemory type and always uses the page pool type, this leads to invalid\nmappings and causes the crash. Therefore, check the xdp_buff memory type\nin stmmac_xdp_xmit_back() to fix this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71095",
"url": "https://www.suse.com/security/cve/CVE-2025-71095"
},
{
"category": "external",
"summary": "SUSE Bug 1256605 for CVE-2025-71095",
"url": "https://bugzilla.suse.com/1256605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71095"
},
{
"cve": "CVE-2025-71096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly\n\nThe netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a\nLS_NLA_TYPE_DGID attribute, it is invalid if it does not.\n\nUse the nl parsing logic properly and call nla_parse_deprecated() to fill\nthe nlattrs array and then directly index that array to get the data for\nthe DGID. Just fail if it is NULL.\n\nRemove the for loop searching for the nla, and squash the validation and\nparsing into one function.\n\nFixes an uninitialized read from the stack triggered by userspace if it\ndoes not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE\nquery.\n\n BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]\n BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n hex_byte_pack include/linux/hex.h:13 [inline]\n ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509\n ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633\n pointer+0xc09/0x1bd0 lib/vsprintf.c:2542\n vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930\n vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279\n vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426\n vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465\n vprintk+0x36/0x50 kernel/printk/printk_safe.c:82\n _printk+0x17e/0x1b0 kernel/printk/printk.c:2475\n ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]\n ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141\n rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]\n rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]\n rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:714 [inline]\n __sock_sendmsg+0x333/0x3d0 net/socket.c:729\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671\n __sys_sendmsg+0x1aa/0x300 net/socket.c:2703\n __compat_sys_sendmsg net/compat.c:346 [inline]\n __do_compat_sys_sendmsg net/compat.c:353 [inline]\n __se_compat_sys_sendmsg net/compat.c:350 [inline]\n __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350\n ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71096",
"url": "https://www.suse.com/security/cve/CVE-2025-71096"
},
{
"category": "external",
"summary": "SUSE Bug 1256606 for CVE-2025-71096",
"url": "https://bugzilla.suse.com/1256606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71096"
},
{
"cve": "CVE-2025-71097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: Fix reference count leak when using error routes with nexthop objects\n\nWhen a nexthop object is deleted, it is marked as dead and then\nfib_table_flush() is called to flush all the routes that are using the\ndead nexthop.\n\nThe current logic in fib_table_flush() is to only flush error routes\n(e.g., blackhole) when it is called as part of network namespace\ndismantle (i.e., with flush_all=true). Therefore, error routes are not\nflushed when their nexthop object is deleted:\n\n # ip link add name dummy1 up type dummy\n # ip nexthop add id 1 dev dummy1\n # ip route add 198.51.100.1/32 nhid 1\n # ip route add blackhole 198.51.100.2/32 nhid 1\n # ip nexthop del id 1\n # ip route show\n blackhole 198.51.100.2 nhid 1 dev dummy1\n\nAs such, they keep holding a reference on the nexthop object which in\nturn holds a reference on the nexthop device, resulting in a reference\ncount leak:\n\n # ip link del dev dummy1\n [ 70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2\n\nFix by flushing error routes when their nexthop is marked as dead.\n\nIPv6 does not suffer from this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71097",
"url": "https://www.suse.com/security/cve/CVE-2025-71097"
},
{
"category": "external",
"summary": "SUSE Bug 1256607 for CVE-2025-71097",
"url": "https://bugzilla.suse.com/1256607"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71097"
},
{
"cve": "CVE-2025-71098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_gre: make ip6gre_header() robust\n\nOver the years, syzbot found many ways to crash the kernel\nin ip6gre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ip6gre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0\n------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:213 !\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n neigh_output include/net/neighbour.h:556 [inline]\n ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136\n __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]\n ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71098",
"url": "https://www.suse.com/security/cve/CVE-2025-71098"
},
{
"category": "external",
"summary": "SUSE Bug 1256591 for CVE-2025-71098",
"url": "https://bugzilla.suse.com/1256591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71098"
},
{
"cve": "CVE-2025-71099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()\n\nIn xe_oa_add_config_ioctl(), we accessed oa_config-\u003eid after dropping\nmetrics_lock. Since this lock protects the lifetime of oa_config, an\nattacker could guess the id and call xe_oa_remove_config_ioctl() with\nperfect timing, freeing oa_config before we dereference it, leading to\na potential use-after-free.\n\nFix this by caching the id in a local variable while holding the lock.\n\nv2: (Matt A)\n- Dropped mutex_unlock(\u0026oa-\u003emetrics_lock) ordering change from\n xe_oa_remove_config_ioctl()\n\n(cherry picked from commit 28aeaed130e8e587fd1b73b6d66ca41ccc5a1a31)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71099",
"url": "https://www.suse.com/security/cve/CVE-2025-71099"
},
{
"category": "external",
"summary": "SUSE Bug 1256592 for CVE-2025-71099",
"url": "https://bugzilla.suse.com/1256592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71099"
},
{
"cve": "CVE-2025-71100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71100"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()\n\nTID getting from ieee80211_get_tid() might be out of range of array size\nof sta_entry-\u003etids[], so check TID is less than MAX_TID_COUNT. Othwerwise,\nUBSAN warn:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi/rtl8192cu/trx.c:514:30\n index 10 is out of range for type \u0027rtl_tid_data [9]\u0027",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71100",
"url": "https://www.suse.com/security/cve/CVE-2025-71100"
},
{
"category": "external",
"summary": "SUSE Bug 1256593 for CVE-2025-71100",
"url": "https://bugzilla.suse.com/1256593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71100"
},
{
"cve": "CVE-2025-71101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing\n\nThe hp_populate_*_elements_from_package() functions in the hp-bioscfg\ndriver contain out-of-bounds array access vulnerabilities.\n\nThese functions parse ACPI packages into internal data structures using\na for loop with index variable \u0027elem\u0027 that iterates through\nenum_obj/integer_obj/order_obj/password_obj/string_obj arrays.\n\nWhen processing multi-element fields like PREREQUISITES and\nENUM_POSSIBLE_VALUES, these functions read multiple consecutive array\nelements using expressions like \u0027enum_obj[elem + reqs]\u0027 and\n\u0027enum_obj[elem + pos_values]\u0027 within nested loops.\n\nThe bug is that the bounds check only validated elem, but did not consider\nthe additional offset when accessing elem + reqs or elem + pos_values.\n\nThe fix changes the bounds check to validate the actual accessed index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71101",
"url": "https://www.suse.com/security/cve/CVE-2025-71101"
},
{
"category": "external",
"summary": "SUSE Bug 1256594 for CVE-2025-71101",
"url": "https://bugzilla.suse.com/1256594"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71101"
},
{
"cve": "CVE-2025-71108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Handle incorrect num_connectors capability\n\nThe UCSI spec states that the num_connectors field is 7 bits, and the\n8th bit is reserved and should be set to zero.\nSome buggy FW has been known to set this bit, and it can lead to a\nsystem not booting.\nFlag that the FW is not behaving correctly, and auto-fix the value\nso that the system boots correctly.\n\nFound on Lenovo P1 G8 during Linux enablement program. The FW will\nbe fixed, but seemed worth addressing in case it hit platforms that\naren\u0027t officially Linux supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71108",
"url": "https://www.suse.com/security/cve/CVE-2025-71108"
},
{
"category": "external",
"summary": "SUSE Bug 1256774 for CVE-2025-71108",
"url": "https://bugzilla.suse.com/1256774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71108"
},
{
"cve": "CVE-2025-71111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Convert macros to functions to avoid TOCTOU\n\nThe macro FAN_FROM_REG evaluates its arguments multiple times. When used\nin lockless contexts involving shared driver data, this leads to\nTime-of-Check to Time-of-Use (TOCTOU) race conditions, potentially\ncausing divide-by-zero errors.\n\nConvert the macro to a static function. This guarantees that arguments\nare evaluated only once (pass-by-value), preventing the race\nconditions.\n\nAdditionally, in store_fan_div, move the calculation of the minimum\nlimit inside the update lock. This ensures that the read-modify-write\nsequence operates on consistent data.\n\nAdhere to the principle of minimal changes by only converting macros\nthat evaluate arguments multiple times and are used in lockless\ncontexts.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71111",
"url": "https://www.suse.com/security/cve/CVE-2025-71111"
},
{
"category": "external",
"summary": "SUSE Bug 1256728 for CVE-2025-71111",
"url": "https://bugzilla.suse.com/1256728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71111"
},
{
"cve": "CVE-2025-71112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: add VLAN id validation before using\n\nCurrently, the VLAN id may be used without validation when\nreceive a VLAN configuration mailbox from VF. The length of\nvlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause\nout-of-bounds memory access once the VLAN id is bigger than\nor equal to VLAN_N_VID.\n\nTherefore, VLAN id needs to be checked to ensure it is within\nthe range of VLAN_N_VID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71112",
"url": "https://www.suse.com/security/cve/CVE-2025-71112"
},
{
"category": "external",
"summary": "SUSE Bug 1256726 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "external",
"summary": "SUSE Bug 1256727 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71112"
},
{
"cve": "CVE-2025-71114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71114"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvia_wdt: fix critical boot hang due to unnamed resource allocation\n\nThe VIA watchdog driver uses allocate_resource() to reserve a MMIO\nregion for the watchdog control register. However, the allocated\nresource was not given a name, which causes the kernel resource tree\nto contain an entry marked as \"\u003cBAD\u003e\" under /proc/iomem on x86\nplatforms.\n\nDuring boot, this unnamed resource can lead to a critical hang because\nsubsequent resource lookups and conflict checks fail to handle the\ninvalid entry properly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71114",
"url": "https://www.suse.com/security/cve/CVE-2025-71114"
},
{
"category": "external",
"summary": "SUSE Bug 1256752 for CVE-2025-71114",
"url": "https://bugzilla.suse.com/1256752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71114"
},
{
"cve": "CVE-2025-71116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make decode_pool() more resilient against corrupted osdmaps\n\nIf the osdmap is (maliciously) corrupted such that the encoded length\nof ceph_pg_pool envelope is less than what is expected for a particular\nencoding version, out-of-bounds reads may ensue because the only bounds\ncheck that is there is based on that length value.\n\nThis patch adds explicit bounds checks for each field that is decoded\nor skipped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71116",
"url": "https://www.suse.com/security/cve/CVE-2025-71116"
},
{
"category": "external",
"summary": "SUSE Bug 1256744 for CVE-2025-71116",
"url": "https://bugzilla.suse.com/1256744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71116"
},
{
"cve": "CVE-2025-71118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPICA: Avoid walking the Namespace if start_node is NULL\n\nAlthough commit 0c9992315e73 (\"ACPICA: Avoid walking the ACPI Namespace\nif it is not there\") fixed the situation when both start_node and\nacpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed\non Honor Magicbook 14 Pro [1].\n\nThat happens due to the access to the member of parent_node in\nacpi_ns_get_next_node(). The NULL pointer dereference will always\nhappen, no matter whether or not the start_node is equal to\nACPI_ROOT_OBJECT, so move the check of start_node being NULL\nout of the if block.\n\nUnfortunately, all the attempts to contact Honor have failed, they\nrefused to provide any technical support for Linux.\n\nThe bad DSDT table\u0027s dump could be found on GitHub [2].\n\nDMI: HONOR FMB-P/FMB-P-PCB, BIOS 1.13 05/08/2025\n\n[ rjw: Subject adjustment, changelog edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71118",
"url": "https://www.suse.com/security/cve/CVE-2025-71118"
},
{
"category": "external",
"summary": "SUSE Bug 1256763 for CVE-2025-71118",
"url": "https://bugzilla.suse.com/1256763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71118"
},
{
"cve": "CVE-2025-71119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kexec: Enable SMT before waking offline CPUs\n\nIf SMT is disabled or a partial SMT state is enabled, when a new kernel\nimage is loaded for kexec, on reboot the following warning is observed:\n\nkexec: Waking offline cpu 228.\nWARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:223 kexec_prepare_cpus+0x1b0/0x1bc\n[snip]\n NIP kexec_prepare_cpus+0x1b0/0x1bc\n LR kexec_prepare_cpus+0x1a0/0x1bc\n Call Trace:\n kexec_prepare_cpus+0x1a0/0x1bc (unreliable)\n default_machine_kexec+0x160/0x19c\n machine_kexec+0x80/0x88\n kernel_kexec+0xd0/0x118\n __do_sys_reboot+0x210/0x2c4\n system_call_exception+0x124/0x320\n system_call_vectored_common+0x15c/0x2ec\n\nThis occurs as add_cpu() fails due to cpu_bootable() returning false for\nCPUs that fail the cpu_smt_thread_allowed() check or non primary\nthreads if SMT is disabled.\n\nFix the issue by enabling SMT and resetting the number of SMT threads to\nthe number of threads per core, before attempting to wake up all present\nCPUs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71119",
"url": "https://www.suse.com/security/cve/CVE-2025-71119"
},
{
"category": "external",
"summary": "SUSE Bug 1256730 for CVE-2025-71119",
"url": "https://bugzilla.suse.com/1256730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71119"
},
{
"cve": "CVE-2025-71120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf\n\nA zero length gss_token results in pages == 0 and in_token-\u003epages[0]\nis NULL. The code unconditionally evaluates\npage_address(in_token-\u003epages[0]) for the initial memcpy, which can\ndereference NULL even when the copy length is 0. Guard the first\nmemcpy so it only runs when length \u003e 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71120",
"url": "https://www.suse.com/security/cve/CVE-2025-71120"
},
{
"category": "external",
"summary": "SUSE Bug 1256779 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "external",
"summary": "SUSE Bug 1256780 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71120"
},
{
"cve": "CVE-2025-71123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix string copying in parse_apply_sb_mount_options()\n\nstrscpy_pad() can\u0027t be used to copy a non-NUL-term string into a NUL-term\nstring of possibly bigger size. Commit 0efc5990bca5 (\"string.h: Introduce\nmemtostr() and memtostr_pad()\") provides additional information in that\nregard. So if this happens, the following warning is observed:\n\nstrnlen: detected buffer overflow: 65 byte read of buffer size 64\nWARNING: CPU: 0 PID: 28655 at lib/string_helpers.c:1032 __fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nModules linked in:\nCPU: 0 UID: 0 PID: 28655 Comm: syz-executor.3 Not tainted 6.12.54-syzkaller-00144-g5f0270f1ba00 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:__fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nCall Trace:\n \u003cTASK\u003e\n __fortify_panic+0x1f/0x30 lib/string_helpers.c:1039\n strnlen include/linux/fortify-string.h:235 [inline]\n sized_strscpy include/linux/fortify-string.h:309 [inline]\n parse_apply_sb_mount_options fs/ext4/super.c:2504 [inline]\n __ext4_fill_super fs/ext4/super.c:5261 [inline]\n ext4_fill_super+0x3c35/0xad00 fs/ext4/super.c:5706\n get_tree_bdev_flags+0x387/0x620 fs/super.c:1636\n vfs_get_tree+0x93/0x380 fs/super.c:1814\n do_new_mount fs/namespace.c:3553 [inline]\n path_mount+0x6ae/0x1f70 fs/namespace.c:3880\n do_mount fs/namespace.c:3893 [inline]\n __do_sys_mount fs/namespace.c:4103 [inline]\n __se_sys_mount fs/namespace.c:4080 [inline]\n __x64_sys_mount+0x280/0x300 fs/namespace.c:4080\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x64/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nSince userspace is expected to provide s_mount_opts field to be at most 63\ncharacters long with the ending byte being NUL-term, use a 64-byte buffer\nwhich matches the size of s_mount_opts, so that strscpy_pad() does its job\nproperly. Return with error if the user still managed to provide a\nnon-NUL-term string here.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71123",
"url": "https://www.suse.com/security/cve/CVE-2025-71123"
},
{
"category": "external",
"summary": "SUSE Bug 1256757 for CVE-2025-71123",
"url": "https://bugzilla.suse.com/1256757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71123"
},
{
"cve": "CVE-2025-71130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71130"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer\n\nInitialize the eb.vma array with values of 0 when the eb structure is\nfirst set up. In particular, this sets the eb-\u003evma[i].vma pointers to\nNULL, simplifying cleanup and getting rid of the bug described below.\n\nDuring the execution of eb_lookup_vmas(), the eb-\u003evma array is\nsuccessively filled up with struct eb_vma objects. This process includes\ncalling eb_add_vma(), which might fail; however, even in the event of\nfailure, eb-\u003evma[i].vma is set for the currently processed buffer.\n\nIf eb_add_vma() fails, eb_lookup_vmas() returns with an error, which\nprompts a call to eb_release_vmas() to clean up the mess. Since\neb_lookup_vmas() might fail during processing any (possibly not first)\nbuffer, eb_release_vmas() checks whether a buffer\u0027s vma is NULL to know\nat what point did the lookup function fail.\n\nIn eb_lookup_vmas(), eb-\u003evma[i].vma is set to NULL if either the helper\nfunction eb_lookup_vma() or eb_validate_vma() fails. eb-\u003evma[i+1].vma is\nset to NULL in case i915_gem_object_userptr_submit_init() fails; the\ncurrent one needs to be cleaned up by eb_release_vmas() at this point,\nso the next one is set. If eb_add_vma() fails, neither the current nor\nthe next vma is set to NULL, which is a source of a NULL deref bug\ndescribed in the issue linked in the Closes tag.\n\nWhen entering eb_lookup_vmas(), the vma pointers are set to the slab\npoison value, instead of NULL. This doesn\u0027t matter for the actual\nlookup, since it gets overwritten anyway, however the eb_release_vmas()\nfunction only recognizes NULL as the stopping value, hence the pointers\nare being set to NULL as they go in case of intermediate failure. This\npatch changes the approach to filling them all with NULL at the start\ninstead, rather than handling that manually during failure.\n\n(cherry picked from commit 08889b706d4f0b8d2352b7ca29c2d8df4d0787cd)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71130",
"url": "https://www.suse.com/security/cve/CVE-2025-71130"
},
{
"category": "external",
"summary": "SUSE Bug 1256741 for CVE-2025-71130",
"url": "https://bugzilla.suse.com/1256741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71130"
},
{
"cve": "CVE-2025-71131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Do not use req-\u003eiv after crypto_aead_encrypt\n\nAs soon as crypto_aead_encrypt is called, the underlying request\nmay be freed by an asynchronous completion. Thus dereferencing\nreq-\u003eiv after it returns is invalid.\n\nInstead of checking req-\u003eiv against info, create a new variable\nunaligned_info and use it for that purpose instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71131",
"url": "https://www.suse.com/security/cve/CVE-2025-71131"
},
{
"category": "external",
"summary": "SUSE Bug 1256742 for CVE-2025-71131",
"url": "https://bugzilla.suse.com/1256742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71131"
},
{
"cve": "CVE-2025-71132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc91x: fix broken irq-context in PREEMPT_RT\n\nWhen smc91x.c is built with PREEMPT_RT, the following splat occurs\nin FVP_RevC:\n\n[ 13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000\n[ 13.062137] BUG: workqueue leaked atomic, lock or RCU: kworker/2:1[106]\n[ 13.062137] preempt=0x00000000 lock=0-\u003e0 RCU=0-\u003e1 workfn=mld_ifc_work\n[ 13.062266] C\n** replaying previous printk message **\n[ 13.062266] CPU: 2 UID: 0 PID: 106 Comm: kworker/2:1 Not tainted 6.18.0-dirty #179 PREEMPT_{RT,(full)}\n[ 13.062353] Hardware name: , BIOS\n[ 13.062382] Workqueue: mld mld_ifc_work\n[ 13.062469] Call trace:\n[ 13.062494] show_stack+0x24/0x40 (C)\n[ 13.062602] __dump_stack+0x28/0x48\n[ 13.062710] dump_stack_lvl+0x7c/0xb0\n[ 13.062818] dump_stack+0x18/0x34\n[ 13.062926] process_scheduled_works+0x294/0x450\n[ 13.063043] worker_thread+0x260/0x3d8\n[ 13.063124] kthread+0x1c4/0x228\n[ 13.063235] ret_from_fork+0x10/0x20\n\nThis happens because smc_special_trylock() disables IRQs even on PREEMPT_RT,\nbut smc_special_unlock() does not restore IRQs on PREEMPT_RT.\nThe reason is that smc_special_unlock() calls spin_unlock_irqrestore(),\nand rcu_read_unlock_bh() in __dev_queue_xmit() cannot invoke\nrcu_read_unlock() through __local_bh_enable_ip() when current-\u003esoftirq_disable_cnt becomes zero.\n\nTo address this issue, replace smc_special_trylock() with spin_trylock_irqsave().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71132",
"url": "https://www.suse.com/security/cve/CVE-2025-71132"
},
{
"category": "external",
"summary": "SUSE Bug 1256737 for CVE-2025-71132",
"url": "https://bugzilla.suse.com/1256737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71132"
},
{
"cve": "CVE-2025-71133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: avoid invalid read in irdma_net_event\n\nirdma_net_event() should not dereference anything from \"neigh\" (alias\n\"ptr\") until it has checked that the event is NETEVENT_NEIGH_UPDATE.\nOther events come with different structures pointed to by \"ptr\" and they\nmay be smaller than struct neighbour.\n\nMove the read of neigh-\u003edev under the NETEVENT_NEIGH_UPDATE case.\n\nThe bug is mostly harmless, but it triggers KASAN on debug kernels:\n\n BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma]\n Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554\n\n CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1\n Hardware name: [...]\n Workqueue: events rt6_probe_deferred\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x60/0xb0\n print_address_description.constprop.0+0x2c/0x3f0\n print_report+0xb4/0x270\n kasan_report+0x92/0xc0\n irdma_net_event+0x32e/0x3b0 [irdma]\n notifier_call_chain+0x9e/0x180\n atomic_notifier_call_chain+0x5c/0x110\n rt6_do_redirect+0xb91/0x1080\n tcp_v6_err+0xe9b/0x13e0\n icmpv6_notify+0x2b2/0x630\n ndisc_redirect_rcv+0x328/0x530\n icmpv6_rcv+0xc16/0x1360\n ip6_protocol_deliver_rcu+0xb84/0x12e0\n ip6_input_finish+0x117/0x240\n ip6_input+0xc4/0x370\n ipv6_rcv+0x420/0x7d0\n __netif_receive_skb_one_core+0x118/0x1b0\n process_backlog+0xd1/0x5d0\n __napi_poll.constprop.0+0xa3/0x440\n net_rx_action+0x78a/0xba0\n handle_softirqs+0x2d4/0x9c0\n do_softirq+0xad/0xe0\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71133",
"url": "https://www.suse.com/security/cve/CVE-2025-71133"
},
{
"category": "external",
"summary": "SUSE Bug 1256733 for CVE-2025-71133",
"url": "https://bugzilla.suse.com/1256733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71133"
},
{
"cve": "CVE-2025-71135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()\n\nThe variable mddev-\u003eprivate is first assigned to conf and then checked:\n\n conf = mddev-\u003eprivate;\n if (!conf) ...\n\nIf conf is NULL, then mddev-\u003eprivate is also NULL. In this case,\nnull-pointer dereferences can occur when calling raid5_quiesce():\n\n raid5_quiesce(mddev, true);\n raid5_quiesce(mddev, false);\n\nsince mddev-\u003eprivate is assigned to conf again in raid5_quiesce(), and conf\nis dereferenced in several places, for example:\n\n conf-\u003equiesce = 0;\n wake_up(\u0026conf-\u003ewait_for_quiescent);\n\nTo fix this issue, the function should unlock mddev and return before\ninvoking raid5_quiesce() when conf is NULL, following the existing pattern\nin raid5_change_consistency_policy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71135",
"url": "https://www.suse.com/security/cve/CVE-2025-71135"
},
{
"category": "external",
"summary": "SUSE Bug 1256761 for CVE-2025-71135",
"url": "https://bugzilla.suse.com/1256761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71135"
},
{
"cve": "CVE-2025-71136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()\n\nIt\u0027s possible for cp_read() and hdmi_read() to return -EIO. Those\nvalues are further used as indexes for accessing arrays.\n\nFix that by checking return values where it\u0027s needed.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71136",
"url": "https://www.suse.com/security/cve/CVE-2025-71136"
},
{
"category": "external",
"summary": "SUSE Bug 1256759 for CVE-2025-71136",
"url": "https://bugzilla.suse.com/1256759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71136"
},
{
"cve": "CVE-2025-71137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71137"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: fix \"UBSAN: shift-out-of-bounds error\"\n\nThis patch ensures that the RX ring size (rx_pending) is not\nset below the permitted length. This avoids UBSAN\nshift-out-of-bounds errors when users passes small or zero\nring sizes via ethtool -G.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71137",
"url": "https://www.suse.com/security/cve/CVE-2025-71137"
},
{
"category": "external",
"summary": "SUSE Bug 1256760 for CVE-2025-71137",
"url": "https://bugzilla.suse.com/1256760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71137"
},
{
"cve": "CVE-2025-71138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71138"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add missing NULL pointer check for pingpong interface\n\nIt is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a\nsingle place the check is missing.\nAlso use convenient locals instead of phys_enc-\u003e* where available.\n\nPatchwork: https://patchwork.freedesktop.org/patch/693860/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71138",
"url": "https://www.suse.com/security/cve/CVE-2025-71138"
},
{
"category": "external",
"summary": "SUSE Bug 1256785 for CVE-2025-71138",
"url": "https://bugzilla.suse.com/1256785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71138"
},
{
"cve": "CVE-2025-71141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tilcdc: Fix removal actions in case of failed probe\n\nThe drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers\nshould only be called when the device has been successfully registered.\nCurrently, these functions are called unconditionally in tilcdc_fini(),\nwhich causes warnings during probe deferral scenarios.\n\n[ 7.972317] WARNING: CPU: 0 PID: 23 at drivers/gpu/drm/drm_atomic_state_helper.c:175 drm_atomic_helper_crtc_duplicate_state+0x60/0x68\n...\n[ 8.005820] drm_atomic_helper_crtc_duplicate_state from drm_atomic_get_crtc_state+0x68/0x108\n[ 8.005858] drm_atomic_get_crtc_state from drm_atomic_helper_disable_all+0x90/0x1c8\n[ 8.005885] drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x90/0x144\n[ 8.005911] drm_atomic_helper_shutdown from tilcdc_fini+0x68/0xf8 [tilcdc]\n[ 8.005957] tilcdc_fini [tilcdc] from tilcdc_pdev_probe+0xb0/0x6d4 [tilcdc]\n\nFix this by rewriting the failed probe cleanup path using the standard\ngoto error handling pattern, which ensures that cleanup functions are\nonly called on successfully initialized resources. Additionally, remove\nthe now-unnecessary is_registered flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71141",
"url": "https://www.suse.com/security/cve/CVE-2025-71141"
},
{
"category": "external",
"summary": "SUSE Bug 1256756 for CVE-2025-71141",
"url": "https://bugzilla.suse.com/1256756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71141"
},
{
"cve": "CVE-2025-71142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpuset: fix warning when disabling remote partition\n\nA warning was triggered as follows:\n\nWARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110\nRIP: 0010:remote_partition_disable+0xf7/0x110\nRSP: 0018:ffffc90001947d88 EFLAGS: 00000206\nRAX: 0000000000007fff RBX: ffff888103b6e000 RCX: 0000000000006f40\nRDX: 0000000000006f00 RSI: ffffc90001947da8 RDI: ffff888103b6e000\nRBP: ffff888103b6e000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: ffff88810b2e2728 R12: ffffc90001947da8\nR13: 0000000000000000 R14: ffffc90001947da8 R15: ffff8881081f1c00\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f55c8bbe0b2 CR3: 000000010b14c000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n update_prstate+0x2d3/0x580\n cpuset_partition_write+0x94/0xf0\n kernfs_fop_write_iter+0x147/0x200\n vfs_write+0x35d/0x500\n ksys_write+0x66/0xe0\n do_syscall_64+0x6b/0x390\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7f55c8cd4887\n\nReproduction steps (on a 16-CPU machine):\n\n # cd /sys/fs/cgroup/\n # mkdir A1\n # echo +cpuset \u003e A1/cgroup.subtree_control\n # echo \"0-14\" \u003e A1/cpuset.cpus.exclusive\n # mkdir A1/A2\n # echo \"0-14\" \u003e A1/A2/cpuset.cpus.exclusive\n # echo \"root\" \u003e A1/A2/cpuset.cpus.partition\n # echo 0 \u003e /sys/devices/system/cpu/cpu15/online\n # echo member \u003e A1/A2/cpuset.cpus.partition\n\nWhen CPU 15 is offlined, subpartitions_cpus gets cleared because no CPUs\nremain available for the top_cpuset, forcing partitions to share CPUs with\nthe top_cpuset. In this scenario, disabling the remote partition triggers\na warning stating that effective_xcpus is not a subset of\nsubpartitions_cpus. Partitions should be invalidated in this case to\ninform users that the partition is now invalid(cpus are shared with\ntop_cpuset).\n\nTo fix this issue:\n1. Only emit the warning only if subpartitions_cpus is not empty and the\n effective_xcpus is not a subset of subpartitions_cpus.\n2. During the CPU hotplug process, invalidate partitions if\n subpartitions_cpus is empty.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71142",
"url": "https://www.suse.com/security/cve/CVE-2025-71142"
},
{
"category": "external",
"summary": "SUSE Bug 1256748 for CVE-2025-71142",
"url": "https://bugzilla.suse.com/1256748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71142"
},
{
"cve": "CVE-2025-71143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71143"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: samsung: exynos-clkout: Assign .num before accessing .hws\n\nCommit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with\n__counted_by\") annotated the hws member of \u0027struct clk_hw_onecell_data\u0027\nwith __counted_by, which informs the bounds sanitizer (UBSAN_BOUNDS)\nabout the number of elements in .hws[], so that it can warn when .hws[]\nis accessed out of bounds. As noted in that change, the __counted_by\nmember must be initialized with the number of elements before the first\narray access happens, otherwise there will be a warning from each access\nprior to the initialization because the number of elements is zero. This\noccurs in exynos_clkout_probe() due to .num being assigned after .hws[]\nhas been accessed:\n\n UBSAN: array-index-out-of-bounds in drivers/clk/samsung/clk-exynos-clkout.c:178:18\n index 0 is out of range for type \u0027clk_hw *[*]\u0027\n\nMove the .num initialization to before the first access of .hws[],\nclearing up the warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71143",
"url": "https://www.suse.com/security/cve/CVE-2025-71143"
},
{
"category": "external",
"summary": "SUSE Bug 1256749 for CVE-2025-71143",
"url": "https://bugzilla.suse.com/1256749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71143"
},
{
"cve": "CVE-2025-71145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: phy: isp1301: fix non-OF device reference imbalance\n\nA recent change fixing a device reference leak in a UDC driver\nintroduced a potential use-after-free in the non-OF case as the\nisp1301_get_client() helper only increases the reference count for the\nreturned I2C device in the OF case.\n\nIncrement the reference count also for non-OF so that the caller can\ndecrement it unconditionally.\n\nNote that this is inherently racy just as using the returned I2C device\nis since nothing is preventing the PHY driver from being unbound while\nin use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71145",
"url": "https://www.suse.com/security/cve/CVE-2025-71145"
},
{
"category": "external",
"summary": "SUSE Bug 1257155 for CVE-2025-71145",
"url": "https://bugzilla.suse.com/1257155"
},
{
"category": "external",
"summary": "SUSE Bug 1257156 for CVE-2025-71145",
"url": "https://bugzilla.suse.com/1257156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2025-71145"
},
{
"cve": "CVE-2025-71147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71147"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix a memory leak in tpm2_load_cmd\n\n\u0027tpm2_load_cmd\u0027 allocates a tempoary blob indirectly via \u0027tpm2_key_decode\u0027\nbut it is not freed in the failure paths. Address this by wrapping the blob\ninto with a cleanup helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71147",
"url": "https://www.suse.com/security/cve/CVE-2025-71147"
},
{
"category": "external",
"summary": "SUSE Bug 1257158 for CVE-2025-71147",
"url": "https://bugzilla.suse.com/1257158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71147"
},
{
"cve": "CVE-2025-71149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: correctly handle io_poll_add() return value on update\n\nWhen the core of io_uring was updated to handle completions\nconsistently and with fixed return codes, the POLL_REMOVE opcode\nwith updates got slightly broken. If a POLL_ADD is pending and\nthen POLL_REMOVE is used to update the events of that request, if that\nupdate causes the POLL_ADD to now trigger, then that completion is lost\nand a CQE is never posted.\n\nAdditionally, ensure that if an update does cause an existing POLL_ADD\nto complete, that the completion value isn\u0027t always overwritten with\n-ECANCELED. For that case, whatever io_poll_add() set the value to\nshould just be retained.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71149",
"url": "https://www.suse.com/security/cve/CVE-2025-71149"
},
{
"category": "external",
"summary": "SUSE Bug 1257164 for CVE-2025-71149",
"url": "https://bugzilla.suse.com/1257164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71149"
},
{
"cve": "CVE-2025-71154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: rtl8150: fix memory leak on usb_submit_urb() failure\n\nIn async_set_registers(), when usb_submit_urb() fails, the allocated\n async_req structure and URB are not freed, causing a memory leak.\n\n The completion callback async_set_reg_cb() is responsible for freeing\n these allocations, but it is only called after the URB is successfully\n submitted and completes (successfully or with error). If submission\n fails, the callback never runs and the memory is leaked.\n\n Fix this by freeing both the URB and the request structure in the error\n path when usb_submit_urb() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71154",
"url": "https://www.suse.com/security/cve/CVE-2025-71154"
},
{
"category": "external",
"summary": "SUSE Bug 1257163 for CVE-2025-71154",
"url": "https://bugzilla.suse.com/1257163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71154"
},
{
"cve": "CVE-2025-71156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: defer interrupt enabling until NAPI registration\n\nCurrently, interrupts are automatically enabled immediately upon\nrequest. This allows interrupt to fire before the associated NAPI\ncontext is fully initialized and cause failures like below:\n\n[ 0.946369] Call Trace:\n[ 0.946369] \u003cIRQ\u003e\n[ 0.946369] __napi_poll+0x2a/0x1e0\n[ 0.946369] net_rx_action+0x2f9/0x3f0\n[ 0.946369] handle_softirqs+0xd6/0x2c0\n[ 0.946369] ? handle_edge_irq+0xc1/0x1b0\n[ 0.946369] __irq_exit_rcu+0xc3/0xe0\n[ 0.946369] common_interrupt+0x81/0xa0\n[ 0.946369] \u003c/IRQ\u003e\n[ 0.946369] \u003cTASK\u003e\n[ 0.946369] asm_common_interrupt+0x22/0x40\n[ 0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10\n\nUse the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto\nenablement and explicitly enable the interrupt in NAPI initialization\npath (and disable it during NAPI teardown).\n\nThis ensures that interrupt lifecycle is strictly coupled with\nreadiness of NAPI context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71156",
"url": "https://www.suse.com/security/cve/CVE-2025-71156"
},
{
"category": "external",
"summary": "SUSE Bug 1257167 for CVE-2025-71156",
"url": "https://bugzilla.suse.com/1257167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71156"
},
{
"cve": "CVE-2025-71157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: always drop device refcount in ib_del_sub_device_and_put()\n\nSince nldev_deldev() (introduced by commit 060c642b2ab8 (\"RDMA/nldev: Add\nsupport to add/delete a sub IB device through netlink\") grabs a reference\nusing ib_device_get_by_index() before calling ib_del_sub_device_and_put(),\nwe need to drop that reference before returning -EOPNOTSUPP error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71157",
"url": "https://www.suse.com/security/cve/CVE-2025-71157"
},
{
"category": "external",
"summary": "SUSE Bug 1257168 for CVE-2025-71157",
"url": "https://bugzilla.suse.com/1257168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71157"
},
{
"cve": "CVE-2025-71162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: tegra-adma: Fix use-after-free\n\nA use-after-free bug exists in the Tegra ADMA driver when audio streams\nare terminated, particularly during XRUN conditions. The issue occurs\nwhen the DMA buffer is freed by tegra_adma_terminate_all() before the\nvchan completion tasklet finishes accessing it.\n\nThe race condition follows this sequence:\n\n 1. DMA transfer completes, triggering an interrupt that schedules the\n completion tasklet (tasklet has not executed yet)\n 2. Audio playback stops, calling tegra_adma_terminate_all() which\n frees the DMA buffer memory via kfree()\n 3. The scheduled tasklet finally executes, calling vchan_complete()\n which attempts to access the already-freed memory\n\nSince tasklets can execute at any time after being scheduled, there is\nno guarantee that the buffer will remain valid when vchan_complete()\nruns.\n\nFix this by properly synchronizing the virtual channel completion:\n - Calling vchan_terminate_vdesc() in tegra_adma_stop() to mark the\n descriptors as terminated instead of freeing the descriptor.\n - Add the callback tegra_adma_synchronize() that calls\n vchan_synchronize() which kills any pending tasklets and frees any\n terminated descriptors.\n\nCrash logs:\n[ 337.427523] BUG: KASAN: use-after-free in vchan_complete+0x124/0x3b0\n[ 337.427544] Read of size 8 at addr ffff000132055428 by task swapper/0/0\n\n[ 337.427562] Call trace:\n[ 337.427564] dump_backtrace+0x0/0x320\n[ 337.427571] show_stack+0x20/0x30\n[ 337.427575] dump_stack_lvl+0x68/0x84\n[ 337.427584] print_address_description.constprop.0+0x74/0x2b8\n[ 337.427590] kasan_report+0x1f4/0x210\n[ 337.427598] __asan_load8+0xa0/0xd0\n[ 337.427603] vchan_complete+0x124/0x3b0\n[ 337.427609] tasklet_action_common.constprop.0+0x190/0x1d0\n[ 337.427617] tasklet_action+0x30/0x40\n[ 337.427623] __do_softirq+0x1a0/0x5c4\n[ 337.427628] irq_exit+0x110/0x140\n[ 337.427633] handle_domain_irq+0xa4/0xe0\n[ 337.427640] gic_handle_irq+0x64/0x160\n[ 337.427644] call_on_irq_stack+0x20/0x4c\n[ 337.427649] do_interrupt_handler+0x7c/0x90\n[ 337.427654] el1_interrupt+0x30/0x80\n[ 337.427659] el1h_64_irq_handler+0x18/0x30\n[ 337.427663] el1h_64_irq+0x7c/0x80\n[ 337.427667] cpuidle_enter_state+0xe4/0x540\n[ 337.427674] cpuidle_enter+0x54/0x80\n[ 337.427679] do_idle+0x2e0/0x380\n[ 337.427685] cpu_startup_entry+0x2c/0x70\n[ 337.427690] rest_init+0x114/0x130\n[ 337.427695] arch_call_rest_init+0x18/0x24\n[ 337.427702] start_kernel+0x380/0x3b4\n[ 337.427706] __primary_switched+0xc0/0xc8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71162",
"url": "https://www.suse.com/security/cve/CVE-2025-71162"
},
{
"category": "external",
"summary": "SUSE Bug 1257204 for CVE-2025-71162",
"url": "https://bugzilla.suse.com/1257204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71162"
},
{
"cve": "CVE-2025-71163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: fix device leaks on compat bind and unbind\n\nMake sure to drop the reference taken when looking up the idxd device as\npart of the compat bind and unbind sysfs interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71163",
"url": "https://www.suse.com/security/cve/CVE-2025-71163"
},
{
"category": "external",
"summary": "SUSE Bug 1257215 for CVE-2025-71163",
"url": "https://bugzilla.suse.com/1257215"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-71163"
},
{
"cve": "CVE-2026-22976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset\n\n`qfq_class-\u003eleaf_qdisc-\u003eq.qlen \u003e 0` does not imply that the class\nitself is active.\n\nTwo qfq_class objects may point to the same leaf_qdisc. This happens\nwhen:\n\n1. one QFQ qdisc is attached to the dev as the root qdisc, and\n\n2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()\n/ qdisc_put()) and is pending to be destroyed, as in function\ntc_new_tfilter.\n\nWhen packets are enqueued through the root QFQ qdisc, the shared\nleaf_qdisc-\u003eq.qlen increases. At the same time, the second QFQ\nqdisc triggers qdisc_put and qdisc_destroy: the qdisc enters\nqfq_reset() with its own q-\u003eq.qlen == 0, but its class\u0027s leaf\nqdisc-\u003eq.qlen \u003e 0. Therefore, the qfq_reset would wrongly deactivate\nan inactive aggregate and trigger a null-deref in qfq_deactivate_agg:\n\n[ 0.903172] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 0.903571] #PF: supervisor write access in kernel mode\n[ 0.903860] #PF: error_code(0x0002) - not-present page\n[ 0.904177] PGD 10299b067 P4D 10299b067 PUD 10299c067 PMD 0\n[ 0.904502] Oops: Oops: 0002 [#1] SMP NOPTI\n[ 0.904737] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.19.0-rc3+ #2 NONE\n[ 0.905157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014\n[ 0.905754] RIP: 0010:qfq_deactivate_agg (include/linux/list.h:992 (discriminator 2) include/linux/list.h:1006 (discriminator 2) net/sched/sch_qfq.c:1367 (discriminator 2) net/sched/sch_qfq.c:1393 (discriminator 2))\n[ 0.906046] Code: 0f 84 4d 01 00 00 48 89 70 18 8b 4b 10 48 c7 c2 ff ff ff ff 48 8b 78 08 48 d3 e2 48 21 f2 48 2b 13 48 8b 30 48 d3 ea 8b 4b 18 0\n\nCode starting with the faulting instruction\n===========================================\n 0:\t0f 84 4d 01 00 00 \tje 0x153\n 6:\t48 89 70 18 \tmov %rsi,0x18(%rax)\n a:\t8b 4b 10 \tmov 0x10(%rbx),%ecx\n d:\t48 c7 c2 ff ff ff ff \tmov $0xffffffffffffffff,%rdx\n 14:\t48 8b 78 08 \tmov 0x8(%rax),%rdi\n 18:\t48 d3 e2 \tshl %cl,%rdx\n 1b:\t48 21 f2 \tand %rsi,%rdx\n 1e:\t48 2b 13 \tsub (%rbx),%rdx\n 21:\t48 8b 30 \tmov (%rax),%rsi\n 24:\t48 d3 ea \tshr %cl,%rdx\n 27:\t8b 4b 18 \tmov 0x18(%rbx),%ecx\n\t...\n[ 0.907095] RSP: 0018:ffffc900004a39a0 EFLAGS: 00010246\n[ 0.907368] RAX: ffff8881043a0880 RBX: ffff888102953340 RCX: 0000000000000000\n[ 0.907723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 0.908100] RBP: ffff888102952180 R08: 0000000000000000 R09: 0000000000000000\n[ 0.908451] R10: ffff8881043a0000 R11: 0000000000000000 R12: ffff888102952000\n[ 0.908804] R13: ffff888102952180 R14: ffff8881043a0ad8 R15: ffff8881043a0880\n[ 0.909179] FS: 000000002a1a0380(0000) GS:ffff888196d8d000(0000) knlGS:0000000000000000\n[ 0.909572] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 0.909857] CR2: 0000000000000000 CR3: 0000000102993002 CR4: 0000000000772ef0\n[ 0.910247] PKRU: 55555554\n[ 0.910391] Call Trace:\n[ 0.910527] \u003cTASK\u003e\n[ 0.910638] qfq_reset_qdisc (net/sched/sch_qfq.c:357 net/sched/sch_qfq.c:1485)\n[ 0.910826] qdisc_reset (include/linux/skbuff.h:2195 include/linux/skbuff.h:2501 include/linux/skbuff.h:3424 include/linux/skbuff.h:3430 net/sched/sch_generic.c:1036)\n[ 0.911040] __qdisc_destroy (net/sched/sch_generic.c:1076)\n[ 0.911236] tc_new_tfilter (net/sched/cls_api.c:2447)\n[ 0.911447] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958)\n[ 0.911663] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6861)\n[ 0.911894] netlink_rcv_skb (net/netlink/af_netlink.c:2550)\n[ 0.912100] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)\n[ 0.912296] ? __alloc_skb (net/core/skbuff.c:706)\n[ 0.912484] netlink_sendmsg (net/netlink/af\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22976",
"url": "https://www.suse.com/security/cve/CVE-2026-22976"
},
{
"category": "external",
"summary": "SUSE Bug 1257035 for CVE-2026-22976",
"url": "https://bugzilla.suse.com/1257035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22976"
},
{
"cve": "CVE-2026-22977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22977"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sock: fix hardened usercopy panic in sock_recv_errqueue\n\nskbuff_fclone_cache was created without defining a usercopy region,\n[1] unlike skbuff_head_cache which properly whitelists the cb[] field.\n[2] This causes a usercopy BUG() when CONFIG_HARDENED_USERCOPY is\nenabled and the kernel attempts to copy sk_buff.cb data to userspace\nvia sock_recv_errqueue() -\u003e put_cmsg().\n\nThe crash occurs when: 1. TCP allocates an skb using alloc_skb_fclone()\n (from skbuff_fclone_cache) [1]\n2. The skb is cloned via skb_clone() using the pre-allocated fclone\n[3] 3. The cloned skb is queued to sk_error_queue for timestamp\nreporting 4. Userspace reads the error queue via recvmsg(MSG_ERRQUEUE)\n5. sock_recv_errqueue() calls put_cmsg() to copy serr-\u003eee from skb-\u003ecb\n[4] 6. __check_heap_object() fails because skbuff_fclone_cache has no\n usercopy whitelist [5]\n\nWhen cloned skbs allocated from skbuff_fclone_cache are used in the\nsocket error queue, accessing the sock_exterr_skb structure in skb-\u003ecb\nvia put_cmsg() triggers a usercopy hardening violation:\n\n[ 5.379589] usercopy: Kernel memory exposure attempt detected from SLUB object \u0027skbuff_fclone_cache\u0027 (offset 296, size 16)!\n[ 5.382796] kernel BUG at mm/usercopy.c:102!\n[ 5.383923] Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\n[ 5.384903] CPU: 1 UID: 0 PID: 138 Comm: poc_put_cmsg Not tainted 6.12.57 #7\n[ 5.384903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 5.384903] RIP: 0010:usercopy_abort+0x6c/0x80\n[ 5.384903] Code: 1a 86 51 48 c7 c2 40 15 1a 86 41 52 48 c7 c7 c0 15 1a 86 48 0f 45 d6 48 c7 c6 80 15 1a 86 48 89 c1 49 0f 45 f3 e8 84 27 88 ff \u003c0f\u003e 0b 490\n[ 5.384903] RSP: 0018:ffffc900006f77a8 EFLAGS: 00010246\n[ 5.384903] RAX: 000000000000006f RBX: ffff88800f0ad2a8 RCX: 1ffffffff0f72e74\n[ 5.384903] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff87b973a0\n[ 5.384903] RBP: 0000000000000010 R08: 0000000000000000 R09: fffffbfff0f72e74\n[ 5.384903] R10: 0000000000000003 R11: 79706f6372657375 R12: 0000000000000001\n[ 5.384903] R13: ffff88800f0ad2b8 R14: ffffea00003c2b40 R15: ffffea00003c2b00\n[ 5.384903] FS: 0000000011bc4380(0000) GS:ffff8880bf100000(0000) knlGS:0000000000000000\n[ 5.384903] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 5.384903] CR2: 000056aa3b8e5fe4 CR3: 000000000ea26004 CR4: 0000000000770ef0\n[ 5.384903] PKRU: 55555554\n[ 5.384903] Call Trace:\n[ 5.384903] \u003cTASK\u003e\n[ 5.384903] __check_heap_object+0x9a/0xd0\n[ 5.384903] __check_object_size+0x46c/0x690\n[ 5.384903] put_cmsg+0x129/0x5e0\n[ 5.384903] sock_recv_errqueue+0x22f/0x380\n[ 5.384903] tls_sw_recvmsg+0x7ed/0x1960\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 5.384903] ? schedule+0x6d/0x270\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 5.384903] ? mutex_unlock+0x81/0xd0\n[ 5.384903] ? __pfx_mutex_unlock+0x10/0x10\n[ 5.384903] ? __pfx_tls_sw_recvmsg+0x10/0x10\n[ 5.384903] ? _raw_spin_lock_irqsave+0x8f/0xf0\n[ 5.384903] ? _raw_read_unlock_irqrestore+0x20/0x40\n[ 5.384903] ? srso_alias_return_thunk+0x5/0xfbef5\n\nThe crash offset 296 corresponds to skb2-\u003ecb within skbuff_fclones:\n - sizeof(struct sk_buff) = 232 - offsetof(struct sk_buff, cb) = 40 -\n offset of skb2.cb in fclones = 232 + 40 = 272 - crash offset 296 =\n 272 + 24 (inside sock_exterr_skb.ee)\n\nThis patch uses a local stack variable as a bounce buffer to avoid the hardened usercopy check failure.\n\n[1] https://elixir.bootlin.com/linux/v6.12.62/source/net/ipv4/tcp.c#L885\n[2] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5104\n[3] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5566\n[4] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5491\n[5] https://elixir.bootlin.com/linux/v6.12.62/source/mm/slub.c#L5719",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22977",
"url": "https://www.suse.com/security/cve/CVE-2026-22977"
},
{
"category": "external",
"summary": "SUSE Bug 1257053 for CVE-2026-22977",
"url": "https://bugzilla.suse.com/1257053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22977"
},
{
"cve": "CVE-2026-22978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: avoid kernel-infoleak from struct iw_point\n\nstruct iw_point has a 32bit hole on 64bit arches.\n\nstruct iw_point {\n void __user *pointer; /* Pointer to the data (in user space) */\n __u16 length; /* number of fields or size in bytes */\n __u16 flags; /* Optional params */\n};\n\nMake sure to zero the structure to avoid disclosing 32bits of kernel data\nto user space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22978",
"url": "https://www.suse.com/security/cve/CVE-2026-22978"
},
{
"category": "external",
"summary": "SUSE Bug 1257227 for CVE-2026-22978",
"url": "https://bugzilla.suse.com/1257227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22978"
},
{
"cve": "CVE-2026-22984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: prevent potential out-of-bounds reads in handle_auth_done()\n\nPerform an explicit bounds check on payload_len to avoid a possible\nout-of-bounds access in the callout.\n\n[ idryomov: changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22984",
"url": "https://www.suse.com/security/cve/CVE-2026-22984"
},
{
"category": "external",
"summary": "SUSE Bug 1257217 for CVE-2026-22984",
"url": "https://bugzilla.suse.com/1257217"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22984"
},
{
"cve": "CVE-2026-22985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22985"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: Fix RSS LUT NULL pointer crash on early ethtool operations\n\nThe RSS LUT is not initialized until the interface comes up, causing\nthe following NULL pointer crash when ethtool operations like rxhash on/off\nare performed before the interface is brought up for the first time.\n\nMove RSS LUT initialization from ndo_open to vport creation to ensure LUT\nis always available. This enables RSS configuration via ethtool before\nbringing the interface up. Simplify LUT management by maintaining all\nchanges in the driver\u0027s soft copy and programming zeros to the indirection\ntable when rxhash is disabled. Defer HW programming until the interface\ncomes up if it is down during rxhash and LUT configuration changes.\n\nSteps to reproduce:\n** Load idpf driver; interfaces will be created\n\tmodprobe idpf\n** Before bringing the interfaces up, turn rxhash off\n\tethtool -K eth2 rxhash off\n\n[89408.371875] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[89408.371908] #PF: supervisor read access in kernel mode\n[89408.371924] #PF: error_code(0x0000) - not-present page\n[89408.371940] PGD 0 P4D 0\n[89408.371953] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003csnip\u003e\n[89408.372052] RIP: 0010:memcpy_orig+0x16/0x130\n[89408.372310] Call Trace:\n[89408.372317] \u003cTASK\u003e\n[89408.372326] ? idpf_set_features+0xfc/0x180 [idpf]\n[89408.372363] __netdev_update_features+0x295/0xde0\n[89408.372384] ethnl_set_features+0x15e/0x460\n[89408.372406] genl_family_rcv_msg_doit+0x11f/0x180\n[89408.372429] genl_rcv_msg+0x1ad/0x2b0\n[89408.372446] ? __pfx_ethnl_set_features+0x10/0x10\n[89408.372465] ? __pfx_genl_rcv_msg+0x10/0x10\n[89408.372482] netlink_rcv_skb+0x58/0x100\n[89408.372502] genl_rcv+0x2c/0x50\n[89408.372516] netlink_unicast+0x289/0x3e0\n[89408.372533] netlink_sendmsg+0x215/0x440\n[89408.372551] __sys_sendto+0x234/0x240\n[89408.372571] __x64_sys_sendto+0x28/0x30\n[89408.372585] x64_sys_call+0x1909/0x1da0\n[89408.372604] do_syscall_64+0x7a/0xfa0\n[89408.373140] ? clear_bhb_loop+0x60/0xb0\n[89408.373647] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[89408.378887] \u003c/TASK\u003e\n\u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22985",
"url": "https://www.suse.com/security/cve/CVE-2026-22985"
},
{
"category": "external",
"summary": "SUSE Bug 1257277 for CVE-2026-22985",
"url": "https://bugzilla.suse.com/1257277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22985"
},
{
"cve": "CVE-2026-22988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22988"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: do not assume dev_hard_header() does not change skb-\u003ehead\n\narp_create() is the only dev_hard_header() caller\nmaking assumption about skb-\u003ehead being unchanged.\n\nA recent commit broke this assumption.\n\nInitialize @arp pointer after dev_hard_header() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22988",
"url": "https://www.suse.com/security/cve/CVE-2026-22988"
},
{
"category": "external",
"summary": "SUSE Bug 1257282 for CVE-2026-22988",
"url": "https://bugzilla.suse.com/1257282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22988"
},
{
"cve": "CVE-2026-22990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace overzealous BUG_ON in osdmap_apply_incremental()\n\nIf the osdmap is (maliciously) corrupted such that the incremental\nosdmap epoch is different from what is expected, there is no need to\nBUG. Instead, just declare the incremental osdmap to be invalid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22990",
"url": "https://www.suse.com/security/cve/CVE-2026-22990"
},
{
"category": "external",
"summary": "SUSE Bug 1257221 for CVE-2026-22990",
"url": "https://bugzilla.suse.com/1257221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22990"
},
{
"cve": "CVE-2026-22991",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22991"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make free_choose_arg_map() resilient to partial allocation\n\nfree_choose_arg_map() may dereference a NULL pointer if its caller fails\nafter a partial allocation.\n\nFor example, in decode_choose_args(), if allocation of arg_map-\u003eargs\nfails, execution jumps to the fail label and free_choose_arg_map() is\ncalled. Since arg_map-\u003esize is updated to a non-zero value before memory\nallocation, free_choose_arg_map() will iterate over arg_map-\u003eargs and\ndereference a NULL pointer.\n\nTo prevent this potential NULL pointer dereference and make\nfree_choose_arg_map() more resilient, add checks for pointers before\niterating.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22991",
"url": "https://www.suse.com/security/cve/CVE-2026-22991"
},
{
"category": "external",
"summary": "SUSE Bug 1257220 for CVE-2026-22991",
"url": "https://bugzilla.suse.com/1257220"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22991"
},
{
"cve": "CVE-2026-22992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22992"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: return the handler error from mon_handle_auth_done()\n\nCurrently any error from ceph_auth_handle_reply_done() is propagated\nvia finish_auth() but isn\u0027t returned from mon_handle_auth_done(). This\nresults in higher layers learning that (despite the monitor considering\nus to be successfully authenticated) something went wrong in the\nauthentication phase and reacting accordingly, but msgr2 still trying\nto proceed with establishing the session in the background. In the\ncase of secure mode this can trigger a WARN in setup_crypto() and later\nlead to a NULL pointer dereference inside of prepare_auth_signature().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22992",
"url": "https://www.suse.com/security/cve/CVE-2026-22992"
},
{
"category": "external",
"summary": "SUSE Bug 1257218 for CVE-2026-22992",
"url": "https://bugzilla.suse.com/1257218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22992"
},
{
"cve": "CVE-2026-22993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22993"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: Fix RSS LUT NULL ptr issue after soft reset\n\nDuring soft reset, the RSS LUT is freed and not restored unless the\ninterface is up. If an ethtool command that accesses the rss lut is\nattempted immediately after reset, it will result in NULL ptr\ndereference. Also, there is no need to reset the rss lut if the soft reset\ndoes not involve queue count change.\n\nAfter soft reset, set the RSS LUT to default values based on the updated\nqueue count only if the reset was a result of a queue count change and\nthe LUT was not configured by the user. In all other cases, don\u0027t touch\nthe LUT.\n\nSteps to reproduce:\n\n** Bring the interface down (if up)\nifconfig eth1 down\n\n** update the queue count (eg., 27-\u003e20)\nethtool -L eth1 combined 20\n\n** display the RSS LUT\nethtool -x eth1\n\n[82375.558338] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[82375.558373] #PF: supervisor read access in kernel mode\n[82375.558391] #PF: error_code(0x0000) - not-present page\n[82375.558408] PGD 0 P4D 0\n[82375.558421] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003csnip\u003e\n[82375.558516] RIP: 0010:idpf_get_rxfh+0x108/0x150 [idpf]\n[82375.558786] Call Trace:\n[82375.558793] \u003cTASK\u003e\n[82375.558804] rss_prepare.isra.0+0x187/0x2a0\n[82375.558827] rss_prepare_data+0x3a/0x50\n[82375.558845] ethnl_default_doit+0x13d/0x3e0\n[82375.558863] genl_family_rcv_msg_doit+0x11f/0x180\n[82375.558886] genl_rcv_msg+0x1ad/0x2b0\n[82375.558902] ? __pfx_ethnl_default_doit+0x10/0x10\n[82375.558920] ? __pfx_genl_rcv_msg+0x10/0x10\n[82375.558937] netlink_rcv_skb+0x58/0x100\n[82375.558957] genl_rcv+0x2c/0x50\n[82375.558971] netlink_unicast+0x289/0x3e0\n[82375.558988] netlink_sendmsg+0x215/0x440\n[82375.559005] __sys_sendto+0x234/0x240\n[82375.559555] __x64_sys_sendto+0x28/0x30\n[82375.560068] x64_sys_call+0x1909/0x1da0\n[82375.560576] do_syscall_64+0x7a/0xfa0\n[82375.561076] ? clear_bhb_loop+0x60/0xb0\n[82375.561567] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22993",
"url": "https://www.suse.com/security/cve/CVE-2026-22993"
},
{
"category": "external",
"summary": "SUSE Bug 1257180 for CVE-2026-22993",
"url": "https://bugzilla.suse.com/1257180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22993"
},
{
"cve": "CVE-2026-22996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Don\u0027t store mlx5e_priv in mlx5e_dev devlink priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails, mlx5e_priv in mlx5e_dev devlink private is used to\nreference the netdev and mdev associated with that struct. Instead,\nstore netdev directly into mlx5e_dev and get mdev from the containing\nmlx5_adev aux device structure.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000520\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 3 UID: 0 PID: 521 Comm: devlink Not tainted 6.18.0-rc5+ #117 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_remove+0x68/0x130\nRSP: 0018:ffffc900034838f0 EFLAGS: 00010246\nRAX: ffff88810283c380 RBX: ffff888101874400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffff888102d789c0 R08: ffff8881007137f0 R09: ffff888100264e10\nR10: ffffc90003483898 R11: ffffc900034838a0 R12: ffff888100d261a0\nR13: ffff888100d261a0 R14: ffff8881018749a0 R15: ffff888101874400\nFS: 00007f8565fea740(0000) GS:ffff88856a759000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000520 CR3: 000000010b11a004 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22996",
"url": "https://www.suse.com/security/cve/CVE-2026-22996"
},
{
"category": "external",
"summary": "SUSE Bug 1257203 for CVE-2026-22996",
"url": "https://bugzilla.suse.com/1257203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22996"
},
{
"cve": "CVE-2026-22997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts\n\nSince j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is\ncalled only when the timer is enabled, we need to call\nj1939_session_deactivate_activate_next() if we cancelled the timer.\nOtherwise, refcount for j1939_session leaks, which will later appear as\n\n| unregister_netdevice: waiting for vcan0 to become free. Usage count = 2.\n\nproblem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22997",
"url": "https://www.suse.com/security/cve/CVE-2026-22997"
},
{
"category": "external",
"summary": "SUSE Bug 1257202 for CVE-2026-22997",
"url": "https://bugzilla.suse.com/1257202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-22997"
},
{
"cve": "CVE-2026-22999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: do not free existing class in qfq_change_class()\n\nFixes qfq_change_class() error case.\n\ncl-\u003eqdisc and cl should only be freed if a new class and qdisc\nwere allocated, or we risk various UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22999",
"url": "https://www.suse.com/security/cve/CVE-2026-22999"
},
{
"category": "external",
"summary": "SUSE Bug 1257236 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "external",
"summary": "SUSE Bug 1257238 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2026-22999"
},
{
"cve": "CVE-2026-23000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23000"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix crash on profile change rollback failure\n\nmlx5e_netdev_change_profile can fail to attach a new profile and can\nfail to rollback to old profile, in such case, we could end up with a\ndangling netdev with a fully reset netdev_priv. A retry to change\nprofile, e.g. another attempt to call mlx5e_netdev_change_profile via\nswitchdev mode change, will crash trying to access the now NULL\npriv-\u003emdev.\n\nThis fix allows mlx5e_netdev_change_profile() to handle previous\nfailures and an empty priv, by not assuming priv is valid.\n\nPass netdev and mdev to all flows requiring\nmlx5e_netdev_change_profile() and avoid passing priv.\nIn mlx5e_netdev_change_profile() check if current priv is valid, and if\nnot, just attach the new profile without trying to access the old one.\n\nThis fixes the following oops, when enabling switchdev mode for the 2nd\ntime after first time failure:\n\n ## Enabling switchdev mode first time:\n\nmlx5_core 0012:03:00.1: E-Switch: Supported tc chains and prios offload\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n ^^^^^^^^\nmlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\n\n ## retry: Enabling switchdev mode 2nd time:\n\nmlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload\nBUG: kernel NULL pointer dereference, address: 0000000000000038\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 13 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc4+ #91 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_detach_netdev+0x3c/0x90\nCode: 50 00 00 f0 80 4f 78 02 48 8b bf e8 07 00 00 48 85 ff 74 16 48 8b 73 78 48 d1 ee 83 e6 01 83 f6 01 40 0f b6 f6 e8 c4 42 00 00 \u003c48\u003e 8b 45 38 48 85 c0 74 08 48 89 df e8 cc 47 40 1e 48 8b bb f0 07\nRSP: 0018:ffffc90000673890 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff8881036a89c0 RCX: 0000000000000000\nRDX: ffff888113f63800 RSI: ffffffff822fe720 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000002dcd R09: 0000000000000000\nR10: ffffc900006738e8 R11: 00000000ffffffff R12: 0000000000000000\nR13: 0000000000000000 R14: ffff8881036a89c0 R15: 0000000000000000\nFS: 00007fdfb8384740(0000) GS:ffff88856a9d6000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000038 CR3: 0000000112ae0005 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_netdev_change_profile+0x45/0xb0\n mlx5e_vport_rep_load+0x27b/0x2d0\n mlx5_esw_offloads_rep_load+0x72/0xf0\n esw_offloads_enable+0x5d0/0x970\n mlx5_eswitch_enable_locked+0x349/0x430\n ? is_mp_supported+0x57/0xb0\n mlx5_devlink_eswitch_mode_set+0x26b/0x430\n devlink_nl_eswitch_set_doit+0x6f/0xf0\n genl_family_rcv_msg_doit+0xe8/0x140\n genl_rcv_msg+0x18b/0x290\n ? __pfx_devlink_nl_pre_doit+0x10/0x10\n ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10\n ? __pfx_devlink_nl_post_doit+0x10/0x10\n ? __pfx_genl_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x52/0x100\n genl_rcv+0x28/0x40\n netlink_unicast+0x282/0x3e0\n ? __alloc_skb+0xd6/0x190\n netlink_sendmsg+0x1f7/0x430\n __sys_sendto+0x213/0x220\n ? __sys_recvmsg+0x6a/0xd0\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x50/0x1f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7fdfb8495047",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23000",
"url": "https://www.suse.com/security/cve/CVE-2026-23000"
},
{
"category": "external",
"summary": "SUSE Bug 1257234 for CVE-2026-23000",
"url": "https://bugzilla.suse.com/1257234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23000"
},
{
"cve": "CVE-2026-23001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix possible UAF in macvlan_forward_source()\n\nAdd RCU protection on (struct macvlan_source_entry)-\u003evlan.\n\nWhenever macvlan_hash_del_source() is called, we must clear\nentry-\u003evlan pointer before RCU grace period starts.\n\nThis allows macvlan_forward_source() to skip over\nentries queued for freeing.\n\nNote that macvlan_dev are already RCU protected, as they\nare embedded in a standard netdev (netdev_priv(ndev)).\n\nhttps: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23001",
"url": "https://www.suse.com/security/cve/CVE-2026-23001"
},
{
"category": "external",
"summary": "SUSE Bug 1257232 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "external",
"summary": "SUSE Bug 1257233 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "important"
}
],
"title": "CVE-2026-23001"
},
{
"cve": "CVE-2026-23005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23005"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1\n\nWhen loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in\nresponse to a guest WRMSR, clear XFD-disabled features in the saved (or to\nbe restored) XSTATE_BV to ensure KVM doesn\u0027t attempt to load state for\nfeatures that are disabled via the guest\u0027s XFD. Because the kernel\nexecutes XRSTOR with the guest\u0027s XFD, saving XSTATE_BV[i]=1 with XFD[i]=1\nwill cause XRSTOR to #NM and panic the kernel.\n\nE.g. if fpu_update_guest_xfd() sets XFD without clearing XSTATE_BV:\n\n ------------[ cut here ]------------\n WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#29: amx_test/848\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 29 UID: 1000 PID: 848 Comm: amx_test Not tainted 6.19.0-rc2-ffa07f7fd437-x86_amx_nm_xfd_non_init-vm #171 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:exc_device_not_available+0x101/0x110\n Call Trace:\n \u003cTASK\u003e\n asm_exc_device_not_available+0x1a/0x20\n RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90\n switch_fpu_return+0x4a/0xb0\n kvm_arch_vcpu_ioctl_run+0x1245/0x1e40 [kvm]\n kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]\n __x64_sys_ioctl+0x8f/0xd0\n do_syscall_64+0x62/0x940\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nThis can happen if the guest executes WRMSR(MSR_IA32_XFD) to set XFD[18] = 1,\nand a host IRQ triggers kernel_fpu_begin() prior to the vmexit handler\u0027s\ncall to fpu_update_guest_xfd().\n\nand if userspace stuffs XSTATE_BV[i]=1 via KVM_SET_XSAVE:\n\n ------------[ cut here ]------------\n WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#14: amx_test/867\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 14 UID: 1000 PID: 867 Comm: amx_test Not tainted 6.19.0-rc2-2dace9faccd6-x86_amx_nm_xfd_non_init-vm #168 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:exc_device_not_available+0x101/0x110\n Call Trace:\n \u003cTASK\u003e\n asm_exc_device_not_available+0x1a/0x20\n RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90\n fpu_swap_kvm_fpstate+0x6b/0x120\n kvm_load_guest_fpu+0x30/0x80 [kvm]\n kvm_arch_vcpu_ioctl_run+0x85/0x1e40 [kvm]\n kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]\n __x64_sys_ioctl+0x8f/0xd0\n do_syscall_64+0x62/0x940\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nThe new behavior is consistent with the AMX architecture. Per Intel\u0027s SDM,\nXSAVE saves XSTATE_BV as \u00270\u0027 for components that are disabled via XFD\n(and non-compacted XSAVE saves the initial configuration of the state\ncomponent):\n\n If XSAVE, XSAVEC, XSAVEOPT, or XSAVES is saving the state component i,\n the instruction does not generate #NM when XCR0[i] = IA32_XFD[i] = 1;\n instead, it operates as if XINUSE[i] = 0 (and the state component was\n in its initial state): it saves bit i of XSTATE_BV field of the XSAVE\n header as 0; in addition, XSAVE saves the initial configuration of the\n state component (the other instructions do not save state component i).\n\nAlternatively, KVM could always do XRSTOR with XFD=0, e.g. by using\na constant XFD based on the set of enabled features when XSAVEing for\na struct fpu_guest. However, having XSTATE_BV[i]=1 for XFD-disabled\nfeatures can only happen in the above interrupt case, or in similar\nscenarios involving preemption on preemptible kernels, because\nfpu_swap_kvm_fpstate()\u0027s call to save_fpregs_to_fpstate() saves the\noutgoing FPU state with the current XFD; and that is (on all but the\nfirst WRMSR to XFD) the guest XFD.\n\nTherefore, XFD can only go out of sync with XSTATE_BV in the above\ninterrupt case, or in similar scenarios involving preemption on\npreemptible kernels, and it we can consider it (de facto) part of KVM\nABI that KVM_GET_XSAVE returns XSTATE_BV[i]=0 for XFD-disabled features.\n\n[Move clea\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23005",
"url": "https://www.suse.com/security/cve/CVE-2026-23005"
},
{
"category": "external",
"summary": "SUSE Bug 1257245 for CVE-2026-23005",
"url": "https://bugzilla.suse.com/1257245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23005"
},
{
"cve": "CVE-2026-23006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: tlv320adcx140: fix null pointer\n\nThe \"snd_soc_component\" in \"adcx140_priv\" was only used once but never\nset. It was only used for reaching \"dev\" which is already present in\n\"adcx140_priv\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23006",
"url": "https://www.suse.com/security/cve/CVE-2026-23006"
},
{
"category": "external",
"summary": "SUSE Bug 1257208 for CVE-2026-23006",
"url": "https://bugzilla.suse.com/1257208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23006"
},
{
"cve": "CVE-2026-23011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_gre: make ipgre_header() robust\n\nAnalog to commit db5b4e39c4e6 (\"ip6_gre: make ip6gre_header() robust\")\n\nOver the years, syzbot found many ways to crash the kernel\nin ipgre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ipgre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0\n kernel BUG at net/core/skbuff.c:213 !\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: mld mld_ifc_work\n RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213\nCall Trace:\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23011",
"url": "https://www.suse.com/security/cve/CVE-2026-23011"
},
{
"category": "external",
"summary": "SUSE Bug 1257207 for CVE-2026-23011",
"url": "https://bugzilla.suse.com/1257207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_31-rt-1-150700.1.3.2.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.31.2.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.31.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.31.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.31.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T10:04:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23011"
}
]
}
SUSE-SU-2026:0293-1
Vulnerability from csaf_suse - Published: 2026-01-26 11:36 - Updated: 2026-01-26 11:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39890: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (bsc#1250334).\n- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).\n- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).\n- CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647).\n- CVE-2025-40215: kABI: xfrm: delete x-\u003etunnel as we delete x (bsc#1254959).\n- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).\n- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).\n- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).\n- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).\n- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-68259: KVM: SVM: Don\u0027t skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).\n\nThe following non security issues were fixed:\n\n- ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).\n- ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes).\n- ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).\n- ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-fixes).\n- ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-fixes).\n- ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes).\n- ALSA: uapi: Fix typo in asound.h comment (git-fixes).\n- ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).\n- ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).\n- ASoC: ak4458: Disable regulator when error happens (git-fixes).\n- ASoC: ak5558: Disable regulator when error happens (git-fixes).\n- ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).\n- ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).\n- ASoC: qcom: q6adm: the the copp device only during last instance (git-fixes).\n- ASoC: qcom: q6asm-dai: perform correct state check before closing (git-fixes).\n- ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-fixes).\n- ASoC: stm32: sai: fix OF node leak on probe (git-fixes).\n- ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).\n- ASoC: stm32: sai: fix device leak on probe (git-fixes).\n- Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).\n- Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-fixes).\n- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-fixes).\n- Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes).\n- Documentation: hid-alps: Fix packet format section headings (git-fixes).\n- Documentation: parport-lowlevel: Separate function listing code blocks (git-fixes).\n- HID: logitech-dj: Remove duplicate error logging (git-fixes).\n- HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-fixes).\n- Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).\n- Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).\n- Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).\n- KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).\n- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).\n- PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-fixes).\n- PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).\n- PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).\n- PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).\n- Revert \u0027mtd: rawnand: marvell: fix layouts\u0027 (git-fixes).\n- USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes).\n- USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).\n- USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).\n- USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).\n- USB: serial: option: add Quectel RG255C (stable-fixes).\n- USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).\n- USB: serial: option: add UNISOC UIS7720 (stable-fixes).\n- USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).\n- USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes).\n- arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).\n- arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).\n- atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).\n- atm: idt77252: Add missing `dma_map_error()` (stable-fixes).\n- backlight: led-bl: Add devlink to supplier LEDs (git-fixes).\n- backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).\n- bs-upload-kernel: Fix cve branch uploads.\n- btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes).\n- can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes).\n- can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-fixes).\n- can: sja1000: fix max irq loop handling (git-fixes).\n- can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-fixes).\n- cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).\n- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).\n- cifs: avoid redundant calls to disable multichannel (git-fixes).\n- cifs: cifs_pick_channel should try selecting active channels (git-fixes).\n- cifs: deal with the channel loading lag while picking channels (git-fixes).\n- cifs: dns resolution is needed only for primary channel (git-fixes).\n- cifs: do not disable interface polling on failure (git-fixes).\n- cifs: do not search for channel if server is terminating (git-fixes).\n- cifs: fix a pending undercount of srv_count (git-fixes).\n- cifs: fix lock ordering while disabling multichannel (git-fixes).\n- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).\n- cifs: fix use after free for iface while disabling secondary channels (git-fixes).\n- cifs: handle servers that still advertise multichannel after disabling (git-fixes).\n- cifs: handle when server starts supporting multichannel (git-fixes).\n- cifs: handle when server stops supporting multichannel (git-fixes).\n- cifs: make cifs_chan_update_iface() a void function (git-fixes).\n- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).\n- cifs: make sure that channel scaling is done only once (git-fixes).\n- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).\n- cifs: reset connections for all channels when reconnect requested (git-fixes).\n- cifs: reset iface weights when we cannot find a candidate (git-fixes).\n- cifs: serialize other channels when query server interfaces is pending (git-fixes).\n- cifs: update dstaddr whenever channel iface is updated (git-fixes).\n- clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).\n- clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes).\n- clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes).\n- clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).\n- comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).\n- comedi: check device\u0027s attached status in compat ioctls (git-fixes).\n- comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).\n- comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).\n- cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-fixes).\n- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).\n- crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes).\n- crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-fixes).\n- crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).\n- crypto: hisilicon/qm - restore original qos values (git-fixes).\n- crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).\n- crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-fixes).\n- dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).\n- dm-verity: fix unreliable memory allocation (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386).\n- drivers/usb/dwc3: fix PCI parent check (git-fixes).\n- drm/amd/display: Check NULL before accessing (stable-fixes).\n- drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes).\n- drm/amd/display: Increase DPCD read retries (stable-fixes).\n- drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-fixes).\n- drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-fixes).\n- drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).\n- drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).\n- drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).\n- drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).\n- drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-fixes).\n- drm/mgag200: Fix big-endian support (git-fixes).\n- drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).\n- drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-fixes).\n- drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).\n- drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-fixes).\n- drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).\n- drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).\n- drm/vgem-fence: Fix potential deadlock on release (git-fixes).\n- drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).\n- drm: sti: fix device leaks at component probe (git-fixes).\n- efi/libstub: Describe missing \u0027out\u0027 parameter in efi_load_initrd (git-fixes).\n- efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes).\n- fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-fixes).\n- fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).\n- fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).\n- firmware: imx: scu-irq: fix OF node leak in (git-fixes).\n- firmware: stratix10-svc: Add mutex in stratix10 memory management (git-fixes).\n- firmware: stratix10-svc: fix bug in saving controller data (git-fixes).\n- firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-fixes).\n- gpu: host1x: Fix race in syncpt alloc/free (git-fixes).\n- hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).\n- hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).\n- hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).\n- hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-fixes).\n- i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).\n- i2c: i2c.h: fix a bad kernel-doc line (git-fixes).\n- i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).\n- iio: accel: bmc150: Fix irq assumption regression (stable-fixes).\n- iio: accel: fix ADXL355 startup race condition (git-fixes).\n- iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).\n- iio: core: Clean up device correctly on iio_device_alloc() failure (git-fixes).\n- iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).\n- iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-fixes).\n- iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-fixes).\n- iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).\n- ima: Handle error code returned by ima_filter_rule_match() (git-fixes).\n- intel_th: Fix error handling in intel_th_output_open (git-fixes).\n- ipmi: Fix handling of messages with provided receive message pointer (git-fixes).\n- ipmi: Rework user message limit handling (git-fixes).\n- irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).\n- kconfig/mconf: Initialize the default locale at startup (stable-fixes).\n- kconfig/nconf: Initialize the default locale at startup (stable-fixes).\n- leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).\n- leds: leds-lp50xx: Enable chip before any communication (git-fixes).\n- leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-fixes).\n- leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).\n- lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-fixes).\n- mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).\n- media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes).\n- media: amphion: Cancel message work before releasing the VPU core (git-fixes).\n- media: atomisp: Prefix firmware paths with \u0027intel/ipu/\u0027 (bsc#1252973).\n- media: atomisp: Remove firmware_name module parameter (bsc#1252973).\n- media: cec: Fix debugfs leak on bus_register() failure (git-fixes).\n- media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).\n- media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes).\n- media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).\n- media: rc: st_rc: Fix reset control resource leak (git-fixes).\n- media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes).\n- media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).\n- media: v4l2-mem2mem: Fix outdated documentation (git-fixes).\n- media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-fixes).\n- media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-fixes).\n- media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes).\n- media: vpif_capture: fix section mismatch (git-fixes).\n- media: vpif_display: fix section mismatch (git-fixes).\n- mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).\n- mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).\n- mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes).\n- mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).\n- mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).\n- most: usb: fix double free on late probe failure (git-fixes).\n- mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).\n- mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).\n- mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-fixes).\n- mtd: nand: relax ECC parameter validation check (git-fixes).\n- mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes).\n- mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).\n- net: phy: adin1100: Fix software power-down ready condition (git-fixes).\n- net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-fixes).\n- net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-fixes).\n- nvme: Use non zero KATO for persistent discovery connections (git-fixes).\n- orangefs: fix xattr related buffer overflow.. (git-fixes).\n- phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes).\n- pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).\n- platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).\n- platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-fixes).\n- platform/x86: intel: chtwc_int33fe: don\u0027t dereference swnode args (git-fixes).\n- platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).\n- power: supply: apm_power: only unset own apm_get_power_status (git-fixes).\n- power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes).\n- power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes).\n- power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes).\n- power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).\n- powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187).\n- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029).\n- pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-fixes).\n- regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes).\n- regulator: core: disable supply if enabling main regulator fails (git-fixes).\n- rpmsg: glink: fix rpmsg device leak (git-fixes).\n- rtc: gamecube: Check the return value of ioremap() (git-fixes).\n- scripts: teaapi: Add paging.\n- scrits: teaapi: Add list_repos.\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes).\n- slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-fixes).\n- smb3: add missing null server pointer check (git-fixes).\n- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).\n- smb: client: fix warning when reconnecting channel (git-fixes).\n- smb: client: introduce close_cached_dir_locked() (git-fixes).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- soc: amlogic: canvas: fix device leak on lookup (git-fixes).\n- soc: qcom: ocmem: fix device leak on lookup (git-fixes).\n- soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-fixes).\n- spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).\n- spi: bcm63xx: drop wrong casts in probe() (git-fixes).\n- spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-fixes).\n- spi: tegra210-qspi: Remove cache operations (git-fixes).\n- spi: tegra210-quad: Add support for internal DMA (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155).\n- spi: tegra210-quad: Fix timeout handling (git-fixes).\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155).\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes).\n- staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes).\n- thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).\n- tracing: Fix access to trace_event_file (bsc#1254373).\n- uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes).\n- usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).\n- usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).\n- usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).\n- usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).\n- usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).\n- usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes).\n- usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).\n- usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).\n- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).\n- usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).\n- usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-fixes).\n- usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes).\n- usb: phy: Initialize struct usb_phy list_head (git-fixes).\n- usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).\n- usb: raw-gadget: do not limit transfer length (git-fixes).\n- usb: storage: Fix memory leak in USB bulk transport (git-fixes).\n- usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).\n- usb: typec: tipd: Clear interrupts first (git-fixes).\n- usb: typec: ucsi: psy: Set max current to zero when disconnected (git-fixes).\n- usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes).\n- usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).\n- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).\n- watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).\n- wifi: ath11k: fix peer HE MCS assignment (git-fixes).\n- wifi: ath11k: restore register window after global reset (git-fixes).\n- wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-fixes).\n- wifi: ieee80211: correct FILS status codes (git-fixes).\n- wifi: mac80211: fix CMAC functions not handling errors (git-fixes).\n- wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).\n- wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-fixes).\n- wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-fixes).\n- wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes).\n- x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-fixes).\n- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).\n- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).\n- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).\n- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).\n- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).\n- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528).\n- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).\n- x86/microcode/AMD: Fix __apply_microcode_amd()\u0027s return value (bsc#1256528).\n- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).\n- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).\n- x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).\n- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).\n- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).\n- xhci: dbgtty: fix device unregister (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-293,SUSE-SLE-Module-Live-Patching-15-SP6-2026-293,SUSE-SLE-Product-HA-15-SP6-2026-293,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-293,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-293,openSUSE-SLE-15.6-2026-293",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0293-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0293-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012628",
"url": "https://bugzilla.suse.com/1012628"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1214635",
"url": "https://bugzilla.suse.com/1214635"
},
{
"category": "self",
"summary": "SUSE Bug 1214847",
"url": "https://bugzilla.suse.com/1214847"
},
{
"category": "self",
"summary": "SUSE Bug 1215146",
"url": "https://bugzilla.suse.com/1215146"
},
{
"category": "self",
"summary": "SUSE Bug 1215211",
"url": "https://bugzilla.suse.com/1215211"
},
{
"category": "self",
"summary": "SUSE Bug 1215344",
"url": "https://bugzilla.suse.com/1215344"
},
{
"category": "self",
"summary": "SUSE Bug 1216062",
"url": "https://bugzilla.suse.com/1216062"
},
{
"category": "self",
"summary": "SUSE Bug 1216436",
"url": "https://bugzilla.suse.com/1216436"
},
{
"category": "self",
"summary": "SUSE Bug 1219165",
"url": "https://bugzilla.suse.com/1219165"
},
{
"category": "self",
"summary": "SUSE Bug 1220419",
"url": "https://bugzilla.suse.com/1220419"
},
{
"category": "self",
"summary": "SUSE Bug 1223731",
"url": "https://bugzilla.suse.com/1223731"
},
{
"category": "self",
"summary": "SUSE Bug 1234163",
"url": "https://bugzilla.suse.com/1234163"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245449",
"url": "https://bugzilla.suse.com/1245449"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248886",
"url": "https://bugzilla.suse.com/1248886"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1250334",
"url": "https://bugzilla.suse.com/1250334"
},
{
"category": "self",
"summary": "SUSE Bug 1252046",
"url": "https://bugzilla.suse.com/1252046"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252861",
"url": "https://bugzilla.suse.com/1252861"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252973",
"url": "https://bugzilla.suse.com/1252973"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253262",
"url": "https://bugzilla.suse.com/1253262"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253413",
"url": "https://bugzilla.suse.com/1253413"
},
{
"category": "self",
"summary": "SUSE Bug 1253442",
"url": "https://bugzilla.suse.com/1253442"
},
{
"category": "self",
"summary": "SUSE Bug 1253458",
"url": "https://bugzilla.suse.com/1253458"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254126",
"url": "https://bugzilla.suse.com/1254126"
},
{
"category": "self",
"summary": "SUSE Bug 1254373",
"url": "https://bugzilla.suse.com/1254373"
},
{
"category": "self",
"summary": "SUSE Bug 1254518",
"url": "https://bugzilla.suse.com/1254518"
},
{
"category": "self",
"summary": "SUSE Bug 1254520",
"url": "https://bugzilla.suse.com/1254520"
},
{
"category": "self",
"summary": "SUSE Bug 1254599",
"url": "https://bugzilla.suse.com/1254599"
},
{
"category": "self",
"summary": "SUSE Bug 1254606",
"url": "https://bugzilla.suse.com/1254606"
},
{
"category": "self",
"summary": "SUSE Bug 1254611",
"url": "https://bugzilla.suse.com/1254611"
},
{
"category": "self",
"summary": "SUSE Bug 1254613",
"url": "https://bugzilla.suse.com/1254613"
},
{
"category": "self",
"summary": "SUSE Bug 1254615",
"url": "https://bugzilla.suse.com/1254615"
},
{
"category": "self",
"summary": "SUSE Bug 1254621",
"url": "https://bugzilla.suse.com/1254621"
},
{
"category": "self",
"summary": "SUSE Bug 1254623",
"url": "https://bugzilla.suse.com/1254623"
},
{
"category": "self",
"summary": "SUSE Bug 1254624",
"url": "https://bugzilla.suse.com/1254624"
},
{
"category": "self",
"summary": "SUSE Bug 1254626",
"url": "https://bugzilla.suse.com/1254626"
},
{
"category": "self",
"summary": "SUSE Bug 1254648",
"url": "https://bugzilla.suse.com/1254648"
},
{
"category": "self",
"summary": "SUSE Bug 1254649",
"url": "https://bugzilla.suse.com/1254649"
},
{
"category": "self",
"summary": "SUSE Bug 1254653",
"url": "https://bugzilla.suse.com/1254653"
},
{
"category": "self",
"summary": "SUSE Bug 1254655",
"url": "https://bugzilla.suse.com/1254655"
},
{
"category": "self",
"summary": "SUSE Bug 1254657",
"url": "https://bugzilla.suse.com/1254657"
},
{
"category": "self",
"summary": "SUSE Bug 1254660",
"url": "https://bugzilla.suse.com/1254660"
},
{
"category": "self",
"summary": "SUSE Bug 1254661",
"url": "https://bugzilla.suse.com/1254661"
},
{
"category": "self",
"summary": "SUSE Bug 1254663",
"url": "https://bugzilla.suse.com/1254663"
},
{
"category": "self",
"summary": "SUSE Bug 1254669",
"url": "https://bugzilla.suse.com/1254669"
},
{
"category": "self",
"summary": "SUSE Bug 1254677",
"url": "https://bugzilla.suse.com/1254677"
},
{
"category": "self",
"summary": "SUSE Bug 1254678",
"url": "https://bugzilla.suse.com/1254678"
},
{
"category": "self",
"summary": "SUSE Bug 1254688",
"url": "https://bugzilla.suse.com/1254688"
},
{
"category": "self",
"summary": "SUSE Bug 1254690",
"url": "https://bugzilla.suse.com/1254690"
},
{
"category": "self",
"summary": "SUSE Bug 1254691",
"url": "https://bugzilla.suse.com/1254691"
},
{
"category": "self",
"summary": "SUSE Bug 1254693",
"url": "https://bugzilla.suse.com/1254693"
},
{
"category": "self",
"summary": "SUSE Bug 1254695",
"url": "https://bugzilla.suse.com/1254695"
},
{
"category": "self",
"summary": "SUSE Bug 1254698",
"url": "https://bugzilla.suse.com/1254698"
},
{
"category": "self",
"summary": "SUSE Bug 1254701",
"url": "https://bugzilla.suse.com/1254701"
},
{
"category": "self",
"summary": "SUSE Bug 1254704",
"url": "https://bugzilla.suse.com/1254704"
},
{
"category": "self",
"summary": "SUSE Bug 1254705",
"url": "https://bugzilla.suse.com/1254705"
},
{
"category": "self",
"summary": "SUSE Bug 1254707",
"url": "https://bugzilla.suse.com/1254707"
},
{
"category": "self",
"summary": "SUSE Bug 1254712",
"url": "https://bugzilla.suse.com/1254712"
},
{
"category": "self",
"summary": "SUSE Bug 1254715",
"url": "https://bugzilla.suse.com/1254715"
},
{
"category": "self",
"summary": "SUSE Bug 1254717",
"url": "https://bugzilla.suse.com/1254717"
},
{
"category": "self",
"summary": "SUSE Bug 1254723",
"url": "https://bugzilla.suse.com/1254723"
},
{
"category": "self",
"summary": "SUSE Bug 1254724",
"url": "https://bugzilla.suse.com/1254724"
},
{
"category": "self",
"summary": "SUSE Bug 1254732",
"url": "https://bugzilla.suse.com/1254732"
},
{
"category": "self",
"summary": "SUSE Bug 1254733",
"url": "https://bugzilla.suse.com/1254733"
},
{
"category": "self",
"summary": "SUSE Bug 1254737",
"url": "https://bugzilla.suse.com/1254737"
},
{
"category": "self",
"summary": "SUSE Bug 1254739",
"url": "https://bugzilla.suse.com/1254739"
},
{
"category": "self",
"summary": "SUSE Bug 1254742",
"url": "https://bugzilla.suse.com/1254742"
},
{
"category": "self",
"summary": "SUSE Bug 1254743",
"url": "https://bugzilla.suse.com/1254743"
},
{
"category": "self",
"summary": "SUSE Bug 1254749",
"url": "https://bugzilla.suse.com/1254749"
},
{
"category": "self",
"summary": "SUSE Bug 1254750",
"url": "https://bugzilla.suse.com/1254750"
},
{
"category": "self",
"summary": "SUSE Bug 1254753",
"url": "https://bugzilla.suse.com/1254753"
},
{
"category": "self",
"summary": "SUSE Bug 1254754",
"url": "https://bugzilla.suse.com/1254754"
},
{
"category": "self",
"summary": "SUSE Bug 1254758",
"url": "https://bugzilla.suse.com/1254758"
},
{
"category": "self",
"summary": "SUSE Bug 1254761",
"url": "https://bugzilla.suse.com/1254761"
},
{
"category": "self",
"summary": "SUSE Bug 1254762",
"url": "https://bugzilla.suse.com/1254762"
},
{
"category": "self",
"summary": "SUSE Bug 1254765",
"url": "https://bugzilla.suse.com/1254765"
},
{
"category": "self",
"summary": "SUSE Bug 1254782",
"url": "https://bugzilla.suse.com/1254782"
},
{
"category": "self",
"summary": "SUSE Bug 1254791",
"url": "https://bugzilla.suse.com/1254791"
},
{
"category": "self",
"summary": "SUSE Bug 1254793",
"url": "https://bugzilla.suse.com/1254793"
},
{
"category": "self",
"summary": "SUSE Bug 1254795",
"url": "https://bugzilla.suse.com/1254795"
},
{
"category": "self",
"summary": "SUSE Bug 1254796",
"url": "https://bugzilla.suse.com/1254796"
},
{
"category": "self",
"summary": "SUSE Bug 1254797",
"url": "https://bugzilla.suse.com/1254797"
},
{
"category": "self",
"summary": "SUSE Bug 1254798",
"url": "https://bugzilla.suse.com/1254798"
},
{
"category": "self",
"summary": "SUSE Bug 1254813",
"url": "https://bugzilla.suse.com/1254813"
},
{
"category": "self",
"summary": "SUSE Bug 1254828",
"url": "https://bugzilla.suse.com/1254828"
},
{
"category": "self",
"summary": "SUSE Bug 1254829",
"url": "https://bugzilla.suse.com/1254829"
},
{
"category": "self",
"summary": "SUSE Bug 1254832",
"url": "https://bugzilla.suse.com/1254832"
},
{
"category": "self",
"summary": "SUSE Bug 1254840",
"url": "https://bugzilla.suse.com/1254840"
},
{
"category": "self",
"summary": "SUSE Bug 1254843",
"url": "https://bugzilla.suse.com/1254843"
},
{
"category": "self",
"summary": "SUSE Bug 1254847",
"url": "https://bugzilla.suse.com/1254847"
},
{
"category": "self",
"summary": "SUSE Bug 1254850",
"url": "https://bugzilla.suse.com/1254850"
},
{
"category": "self",
"summary": "SUSE Bug 1254851",
"url": "https://bugzilla.suse.com/1254851"
},
{
"category": "self",
"summary": "SUSE Bug 1254858",
"url": "https://bugzilla.suse.com/1254858"
},
{
"category": "self",
"summary": "SUSE Bug 1254860",
"url": "https://bugzilla.suse.com/1254860"
},
{
"category": "self",
"summary": "SUSE Bug 1254894",
"url": "https://bugzilla.suse.com/1254894"
},
{
"category": "self",
"summary": "SUSE Bug 1254918",
"url": "https://bugzilla.suse.com/1254918"
},
{
"category": "self",
"summary": "SUSE Bug 1254957",
"url": "https://bugzilla.suse.com/1254957"
},
{
"category": "self",
"summary": "SUSE Bug 1254959",
"url": "https://bugzilla.suse.com/1254959"
},
{
"category": "self",
"summary": "SUSE Bug 1254983",
"url": "https://bugzilla.suse.com/1254983"
},
{
"category": "self",
"summary": "SUSE Bug 1255005",
"url": "https://bugzilla.suse.com/1255005"
},
{
"category": "self",
"summary": "SUSE Bug 1255009",
"url": "https://bugzilla.suse.com/1255009"
},
{
"category": "self",
"summary": "SUSE Bug 1255026",
"url": "https://bugzilla.suse.com/1255026"
},
{
"category": "self",
"summary": "SUSE Bug 1255033",
"url": "https://bugzilla.suse.com/1255033"
},
{
"category": "self",
"summary": "SUSE Bug 1255034",
"url": "https://bugzilla.suse.com/1255034"
},
{
"category": "self",
"summary": "SUSE Bug 1255035",
"url": "https://bugzilla.suse.com/1255035"
},
{
"category": "self",
"summary": "SUSE Bug 1255041",
"url": "https://bugzilla.suse.com/1255041"
},
{
"category": "self",
"summary": "SUSE Bug 1255046",
"url": "https://bugzilla.suse.com/1255046"
},
{
"category": "self",
"summary": "SUSE Bug 1255057",
"url": "https://bugzilla.suse.com/1255057"
},
{
"category": "self",
"summary": "SUSE Bug 1255062",
"url": "https://bugzilla.suse.com/1255062"
},
{
"category": "self",
"summary": "SUSE Bug 1255064",
"url": "https://bugzilla.suse.com/1255064"
},
{
"category": "self",
"summary": "SUSE Bug 1255065",
"url": "https://bugzilla.suse.com/1255065"
},
{
"category": "self",
"summary": "SUSE Bug 1255068",
"url": "https://bugzilla.suse.com/1255068"
},
{
"category": "self",
"summary": "SUSE Bug 1255072",
"url": "https://bugzilla.suse.com/1255072"
},
{
"category": "self",
"summary": "SUSE Bug 1255075",
"url": "https://bugzilla.suse.com/1255075"
},
{
"category": "self",
"summary": "SUSE Bug 1255077",
"url": "https://bugzilla.suse.com/1255077"
},
{
"category": "self",
"summary": "SUSE Bug 1255083",
"url": "https://bugzilla.suse.com/1255083"
},
{
"category": "self",
"summary": "SUSE Bug 1255092",
"url": "https://bugzilla.suse.com/1255092"
},
{
"category": "self",
"summary": "SUSE Bug 1255094",
"url": "https://bugzilla.suse.com/1255094"
},
{
"category": "self",
"summary": "SUSE Bug 1255100",
"url": "https://bugzilla.suse.com/1255100"
},
{
"category": "self",
"summary": "SUSE Bug 1255122",
"url": "https://bugzilla.suse.com/1255122"
},
{
"category": "self",
"summary": "SUSE Bug 1255135",
"url": "https://bugzilla.suse.com/1255135"
},
{
"category": "self",
"summary": "SUSE Bug 1255146",
"url": "https://bugzilla.suse.com/1255146"
},
{
"category": "self",
"summary": "SUSE Bug 1255149",
"url": "https://bugzilla.suse.com/1255149"
},
{
"category": "self",
"summary": "SUSE Bug 1255152",
"url": "https://bugzilla.suse.com/1255152"
},
{
"category": "self",
"summary": "SUSE Bug 1255154",
"url": "https://bugzilla.suse.com/1255154"
},
{
"category": "self",
"summary": "SUSE Bug 1255155",
"url": "https://bugzilla.suse.com/1255155"
},
{
"category": "self",
"summary": "SUSE Bug 1255163",
"url": "https://bugzilla.suse.com/1255163"
},
{
"category": "self",
"summary": "SUSE Bug 1255167",
"url": "https://bugzilla.suse.com/1255167"
},
{
"category": "self",
"summary": "SUSE Bug 1255169",
"url": "https://bugzilla.suse.com/1255169"
},
{
"category": "self",
"summary": "SUSE Bug 1255171",
"url": "https://bugzilla.suse.com/1255171"
},
{
"category": "self",
"summary": "SUSE Bug 1255182",
"url": "https://bugzilla.suse.com/1255182"
},
{
"category": "self",
"summary": "SUSE Bug 1255187",
"url": "https://bugzilla.suse.com/1255187"
},
{
"category": "self",
"summary": "SUSE Bug 1255190",
"url": "https://bugzilla.suse.com/1255190"
},
{
"category": "self",
"summary": "SUSE Bug 1255193",
"url": "https://bugzilla.suse.com/1255193"
},
{
"category": "self",
"summary": "SUSE Bug 1255197",
"url": "https://bugzilla.suse.com/1255197"
},
{
"category": "self",
"summary": "SUSE Bug 1255199",
"url": "https://bugzilla.suse.com/1255199"
},
{
"category": "self",
"summary": "SUSE Bug 1255202",
"url": "https://bugzilla.suse.com/1255202"
},
{
"category": "self",
"summary": "SUSE Bug 1255203",
"url": "https://bugzilla.suse.com/1255203"
},
{
"category": "self",
"summary": "SUSE Bug 1255206",
"url": "https://bugzilla.suse.com/1255206"
},
{
"category": "self",
"summary": "SUSE Bug 1255209",
"url": "https://bugzilla.suse.com/1255209"
},
{
"category": "self",
"summary": "SUSE Bug 1255218",
"url": "https://bugzilla.suse.com/1255218"
},
{
"category": "self",
"summary": "SUSE Bug 1255221",
"url": "https://bugzilla.suse.com/1255221"
},
{
"category": "self",
"summary": "SUSE Bug 1255233",
"url": "https://bugzilla.suse.com/1255233"
},
{
"category": "self",
"summary": "SUSE Bug 1255245",
"url": "https://bugzilla.suse.com/1255245"
},
{
"category": "self",
"summary": "SUSE Bug 1255246",
"url": "https://bugzilla.suse.com/1255246"
},
{
"category": "self",
"summary": "SUSE Bug 1255251",
"url": "https://bugzilla.suse.com/1255251"
},
{
"category": "self",
"summary": "SUSE Bug 1255252",
"url": "https://bugzilla.suse.com/1255252"
},
{
"category": "self",
"summary": "SUSE Bug 1255253",
"url": "https://bugzilla.suse.com/1255253"
},
{
"category": "self",
"summary": "SUSE Bug 1255259",
"url": "https://bugzilla.suse.com/1255259"
},
{
"category": "self",
"summary": "SUSE Bug 1255274",
"url": "https://bugzilla.suse.com/1255274"
},
{
"category": "self",
"summary": "SUSE Bug 1255276",
"url": "https://bugzilla.suse.com/1255276"
},
{
"category": "self",
"summary": "SUSE Bug 1255279",
"url": "https://bugzilla.suse.com/1255279"
},
{
"category": "self",
"summary": "SUSE Bug 1255280",
"url": "https://bugzilla.suse.com/1255280"
},
{
"category": "self",
"summary": "SUSE Bug 1255281",
"url": "https://bugzilla.suse.com/1255281"
},
{
"category": "self",
"summary": "SUSE Bug 1255325",
"url": "https://bugzilla.suse.com/1255325"
},
{
"category": "self",
"summary": "SUSE Bug 1255329",
"url": "https://bugzilla.suse.com/1255329"
},
{
"category": "self",
"summary": "SUSE Bug 1255351",
"url": "https://bugzilla.suse.com/1255351"
},
{
"category": "self",
"summary": "SUSE Bug 1255415",
"url": "https://bugzilla.suse.com/1255415"
},
{
"category": "self",
"summary": "SUSE Bug 1255480",
"url": "https://bugzilla.suse.com/1255480"
},
{
"category": "self",
"summary": "SUSE Bug 1255483",
"url": "https://bugzilla.suse.com/1255483"
},
{
"category": "self",
"summary": "SUSE Bug 1255489",
"url": "https://bugzilla.suse.com/1255489"
},
{
"category": "self",
"summary": "SUSE Bug 1255493",
"url": "https://bugzilla.suse.com/1255493"
},
{
"category": "self",
"summary": "SUSE Bug 1255495",
"url": "https://bugzilla.suse.com/1255495"
},
{
"category": "self",
"summary": "SUSE Bug 1255505",
"url": "https://bugzilla.suse.com/1255505"
},
{
"category": "self",
"summary": "SUSE Bug 1255538",
"url": "https://bugzilla.suse.com/1255538"
},
{
"category": "self",
"summary": "SUSE Bug 1255540",
"url": "https://bugzilla.suse.com/1255540"
},
{
"category": "self",
"summary": "SUSE Bug 1255545",
"url": "https://bugzilla.suse.com/1255545"
},
{
"category": "self",
"summary": "SUSE Bug 1255549",
"url": "https://bugzilla.suse.com/1255549"
},
{
"category": "self",
"summary": "SUSE Bug 1255550",
"url": "https://bugzilla.suse.com/1255550"
},
{
"category": "self",
"summary": "SUSE Bug 1255553",
"url": "https://bugzilla.suse.com/1255553"
},
{
"category": "self",
"summary": "SUSE Bug 1255557",
"url": "https://bugzilla.suse.com/1255557"
},
{
"category": "self",
"summary": "SUSE Bug 1255558",
"url": "https://bugzilla.suse.com/1255558"
},
{
"category": "self",
"summary": "SUSE Bug 1255563",
"url": "https://bugzilla.suse.com/1255563"
},
{
"category": "self",
"summary": "SUSE Bug 1255564",
"url": "https://bugzilla.suse.com/1255564"
},
{
"category": "self",
"summary": "SUSE Bug 1255570",
"url": "https://bugzilla.suse.com/1255570"
},
{
"category": "self",
"summary": "SUSE Bug 1255578",
"url": "https://bugzilla.suse.com/1255578"
},
{
"category": "self",
"summary": "SUSE Bug 1255579",
"url": "https://bugzilla.suse.com/1255579"
},
{
"category": "self",
"summary": "SUSE Bug 1255580",
"url": "https://bugzilla.suse.com/1255580"
},
{
"category": "self",
"summary": "SUSE Bug 1255583",
"url": "https://bugzilla.suse.com/1255583"
},
{
"category": "self",
"summary": "SUSE Bug 1255591",
"url": "https://bugzilla.suse.com/1255591"
},
{
"category": "self",
"summary": "SUSE Bug 1255601",
"url": "https://bugzilla.suse.com/1255601"
},
{
"category": "self",
"summary": "SUSE Bug 1255603",
"url": "https://bugzilla.suse.com/1255603"
},
{
"category": "self",
"summary": "SUSE Bug 1255605",
"url": "https://bugzilla.suse.com/1255605"
},
{
"category": "self",
"summary": "SUSE Bug 1255611",
"url": "https://bugzilla.suse.com/1255611"
},
{
"category": "self",
"summary": "SUSE Bug 1255616",
"url": "https://bugzilla.suse.com/1255616"
},
{
"category": "self",
"summary": "SUSE Bug 1255617",
"url": "https://bugzilla.suse.com/1255617"
},
{
"category": "self",
"summary": "SUSE Bug 1255618",
"url": "https://bugzilla.suse.com/1255618"
},
{
"category": "self",
"summary": "SUSE Bug 1255621",
"url": "https://bugzilla.suse.com/1255621"
},
{
"category": "self",
"summary": "SUSE Bug 1255628",
"url": "https://bugzilla.suse.com/1255628"
},
{
"category": "self",
"summary": "SUSE Bug 1255629",
"url": "https://bugzilla.suse.com/1255629"
},
{
"category": "self",
"summary": "SUSE Bug 1255630",
"url": "https://bugzilla.suse.com/1255630"
},
{
"category": "self",
"summary": "SUSE Bug 1255632",
"url": "https://bugzilla.suse.com/1255632"
},
{
"category": "self",
"summary": "SUSE Bug 1255636",
"url": "https://bugzilla.suse.com/1255636"
},
{
"category": "self",
"summary": "SUSE Bug 1255688",
"url": "https://bugzilla.suse.com/1255688"
},
{
"category": "self",
"summary": "SUSE Bug 1255691",
"url": "https://bugzilla.suse.com/1255691"
},
{
"category": "self",
"summary": "SUSE Bug 1255702",
"url": "https://bugzilla.suse.com/1255702"
},
{
"category": "self",
"summary": "SUSE Bug 1255704",
"url": "https://bugzilla.suse.com/1255704"
},
{
"category": "self",
"summary": "SUSE Bug 1255706",
"url": "https://bugzilla.suse.com/1255706"
},
{
"category": "self",
"summary": "SUSE Bug 1255722",
"url": "https://bugzilla.suse.com/1255722"
},
{
"category": "self",
"summary": "SUSE Bug 1255758",
"url": "https://bugzilla.suse.com/1255758"
},
{
"category": "self",
"summary": "SUSE Bug 1255759",
"url": "https://bugzilla.suse.com/1255759"
},
{
"category": "self",
"summary": "SUSE Bug 1255760",
"url": "https://bugzilla.suse.com/1255760"
},
{
"category": "self",
"summary": "SUSE Bug 1255763",
"url": "https://bugzilla.suse.com/1255763"
},
{
"category": "self",
"summary": "SUSE Bug 1255769",
"url": "https://bugzilla.suse.com/1255769"
},
{
"category": "self",
"summary": "SUSE Bug 1255770",
"url": "https://bugzilla.suse.com/1255770"
},
{
"category": "self",
"summary": "SUSE Bug 1255772",
"url": "https://bugzilla.suse.com/1255772"
},
{
"category": "self",
"summary": "SUSE Bug 1255774",
"url": "https://bugzilla.suse.com/1255774"
},
{
"category": "self",
"summary": "SUSE Bug 1255775",
"url": "https://bugzilla.suse.com/1255775"
},
{
"category": "self",
"summary": "SUSE Bug 1255776",
"url": "https://bugzilla.suse.com/1255776"
},
{
"category": "self",
"summary": "SUSE Bug 1255780",
"url": "https://bugzilla.suse.com/1255780"
},
{
"category": "self",
"summary": "SUSE Bug 1255785",
"url": "https://bugzilla.suse.com/1255785"
},
{
"category": "self",
"summary": "SUSE Bug 1255786",
"url": "https://bugzilla.suse.com/1255786"
},
{
"category": "self",
"summary": "SUSE Bug 1255789",
"url": "https://bugzilla.suse.com/1255789"
},
{
"category": "self",
"summary": "SUSE Bug 1255790",
"url": "https://bugzilla.suse.com/1255790"
},
{
"category": "self",
"summary": "SUSE Bug 1255792",
"url": "https://bugzilla.suse.com/1255792"
},
{
"category": "self",
"summary": "SUSE Bug 1255793",
"url": "https://bugzilla.suse.com/1255793"
},
{
"category": "self",
"summary": "SUSE Bug 1255795",
"url": "https://bugzilla.suse.com/1255795"
},
{
"category": "self",
"summary": "SUSE Bug 1255798",
"url": "https://bugzilla.suse.com/1255798"
},
{
"category": "self",
"summary": "SUSE Bug 1255800",
"url": "https://bugzilla.suse.com/1255800"
},
{
"category": "self",
"summary": "SUSE Bug 1255801",
"url": "https://bugzilla.suse.com/1255801"
},
{
"category": "self",
"summary": "SUSE Bug 1255806",
"url": "https://bugzilla.suse.com/1255806"
},
{
"category": "self",
"summary": "SUSE Bug 1255807",
"url": "https://bugzilla.suse.com/1255807"
},
{
"category": "self",
"summary": "SUSE Bug 1255809",
"url": "https://bugzilla.suse.com/1255809"
},
{
"category": "self",
"summary": "SUSE Bug 1255810",
"url": "https://bugzilla.suse.com/1255810"
},
{
"category": "self",
"summary": "SUSE Bug 1255812",
"url": "https://bugzilla.suse.com/1255812"
},
{
"category": "self",
"summary": "SUSE Bug 1255814",
"url": "https://bugzilla.suse.com/1255814"
},
{
"category": "self",
"summary": "SUSE Bug 1255820",
"url": "https://bugzilla.suse.com/1255820"
},
{
"category": "self",
"summary": "SUSE Bug 1255838",
"url": "https://bugzilla.suse.com/1255838"
},
{
"category": "self",
"summary": "SUSE Bug 1255842",
"url": "https://bugzilla.suse.com/1255842"
},
{
"category": "self",
"summary": "SUSE Bug 1255843",
"url": "https://bugzilla.suse.com/1255843"
},
{
"category": "self",
"summary": "SUSE Bug 1255872",
"url": "https://bugzilla.suse.com/1255872"
},
{
"category": "self",
"summary": "SUSE Bug 1255875",
"url": "https://bugzilla.suse.com/1255875"
},
{
"category": "self",
"summary": "SUSE Bug 1255879",
"url": "https://bugzilla.suse.com/1255879"
},
{
"category": "self",
"summary": "SUSE Bug 1255883",
"url": "https://bugzilla.suse.com/1255883"
},
{
"category": "self",
"summary": "SUSE Bug 1255884",
"url": "https://bugzilla.suse.com/1255884"
},
{
"category": "self",
"summary": "SUSE Bug 1255886",
"url": "https://bugzilla.suse.com/1255886"
},
{
"category": "self",
"summary": "SUSE Bug 1255888",
"url": "https://bugzilla.suse.com/1255888"
},
{
"category": "self",
"summary": "SUSE Bug 1255890",
"url": "https://bugzilla.suse.com/1255890"
},
{
"category": "self",
"summary": "SUSE Bug 1255891",
"url": "https://bugzilla.suse.com/1255891"
},
{
"category": "self",
"summary": "SUSE Bug 1255892",
"url": "https://bugzilla.suse.com/1255892"
},
{
"category": "self",
"summary": "SUSE Bug 1255899",
"url": "https://bugzilla.suse.com/1255899"
},
{
"category": "self",
"summary": "SUSE Bug 1255902",
"url": "https://bugzilla.suse.com/1255902"
},
{
"category": "self",
"summary": "SUSE Bug 1255907",
"url": "https://bugzilla.suse.com/1255907"
},
{
"category": "self",
"summary": "SUSE Bug 1255911",
"url": "https://bugzilla.suse.com/1255911"
},
{
"category": "self",
"summary": "SUSE Bug 1255915",
"url": "https://bugzilla.suse.com/1255915"
},
{
"category": "self",
"summary": "SUSE Bug 1255918",
"url": "https://bugzilla.suse.com/1255918"
},
{
"category": "self",
"summary": "SUSE Bug 1255921",
"url": "https://bugzilla.suse.com/1255921"
},
{
"category": "self",
"summary": "SUSE Bug 1255924",
"url": "https://bugzilla.suse.com/1255924"
},
{
"category": "self",
"summary": "SUSE Bug 1255925",
"url": "https://bugzilla.suse.com/1255925"
},
{
"category": "self",
"summary": "SUSE Bug 1255931",
"url": "https://bugzilla.suse.com/1255931"
},
{
"category": "self",
"summary": "SUSE Bug 1255932",
"url": "https://bugzilla.suse.com/1255932"
},
{
"category": "self",
"summary": "SUSE Bug 1255934",
"url": "https://bugzilla.suse.com/1255934"
},
{
"category": "self",
"summary": "SUSE Bug 1255943",
"url": "https://bugzilla.suse.com/1255943"
},
{
"category": "self",
"summary": "SUSE Bug 1255944",
"url": "https://bugzilla.suse.com/1255944"
},
{
"category": "self",
"summary": "SUSE Bug 1255949",
"url": "https://bugzilla.suse.com/1255949"
},
{
"category": "self",
"summary": "SUSE Bug 1255951",
"url": "https://bugzilla.suse.com/1255951"
},
{
"category": "self",
"summary": "SUSE Bug 1255952",
"url": "https://bugzilla.suse.com/1255952"
},
{
"category": "self",
"summary": "SUSE Bug 1255955",
"url": "https://bugzilla.suse.com/1255955"
},
{
"category": "self",
"summary": "SUSE Bug 1255957",
"url": "https://bugzilla.suse.com/1255957"
},
{
"category": "self",
"summary": "SUSE Bug 1255961",
"url": "https://bugzilla.suse.com/1255961"
},
{
"category": "self",
"summary": "SUSE Bug 1255963",
"url": "https://bugzilla.suse.com/1255963"
},
{
"category": "self",
"summary": "SUSE Bug 1255964",
"url": "https://bugzilla.suse.com/1255964"
},
{
"category": "self",
"summary": "SUSE Bug 1255967",
"url": "https://bugzilla.suse.com/1255967"
},
{
"category": "self",
"summary": "SUSE Bug 1255974",
"url": "https://bugzilla.suse.com/1255974"
},
{
"category": "self",
"summary": "SUSE Bug 1255978",
"url": "https://bugzilla.suse.com/1255978"
},
{
"category": "self",
"summary": "SUSE Bug 1255984",
"url": "https://bugzilla.suse.com/1255984"
},
{
"category": "self",
"summary": "SUSE Bug 1255988",
"url": "https://bugzilla.suse.com/1255988"
},
{
"category": "self",
"summary": "SUSE Bug 1255990",
"url": "https://bugzilla.suse.com/1255990"
},
{
"category": "self",
"summary": "SUSE Bug 1255992",
"url": "https://bugzilla.suse.com/1255992"
},
{
"category": "self",
"summary": "SUSE Bug 1255993",
"url": "https://bugzilla.suse.com/1255993"
},
{
"category": "self",
"summary": "SUSE Bug 1255994",
"url": "https://bugzilla.suse.com/1255994"
},
{
"category": "self",
"summary": "SUSE Bug 1255996",
"url": "https://bugzilla.suse.com/1255996"
},
{
"category": "self",
"summary": "SUSE Bug 1256033",
"url": "https://bugzilla.suse.com/1256033"
},
{
"category": "self",
"summary": "SUSE Bug 1256034",
"url": "https://bugzilla.suse.com/1256034"
},
{
"category": "self",
"summary": "SUSE Bug 1256045",
"url": "https://bugzilla.suse.com/1256045"
},
{
"category": "self",
"summary": "SUSE Bug 1256050",
"url": "https://bugzilla.suse.com/1256050"
},
{
"category": "self",
"summary": "SUSE Bug 1256058",
"url": "https://bugzilla.suse.com/1256058"
},
{
"category": "self",
"summary": "SUSE Bug 1256071",
"url": "https://bugzilla.suse.com/1256071"
},
{
"category": "self",
"summary": "SUSE Bug 1256074",
"url": "https://bugzilla.suse.com/1256074"
},
{
"category": "self",
"summary": "SUSE Bug 1256081",
"url": "https://bugzilla.suse.com/1256081"
},
{
"category": "self",
"summary": "SUSE Bug 1256082",
"url": "https://bugzilla.suse.com/1256082"
},
{
"category": "self",
"summary": "SUSE Bug 1256083",
"url": "https://bugzilla.suse.com/1256083"
},
{
"category": "self",
"summary": "SUSE Bug 1256084",
"url": "https://bugzilla.suse.com/1256084"
},
{
"category": "self",
"summary": "SUSE Bug 1256085",
"url": "https://bugzilla.suse.com/1256085"
},
{
"category": "self",
"summary": "SUSE Bug 1256090",
"url": "https://bugzilla.suse.com/1256090"
},
{
"category": "self",
"summary": "SUSE Bug 1256093",
"url": "https://bugzilla.suse.com/1256093"
},
{
"category": "self",
"summary": "SUSE Bug 1256094",
"url": "https://bugzilla.suse.com/1256094"
},
{
"category": "self",
"summary": "SUSE Bug 1256095",
"url": "https://bugzilla.suse.com/1256095"
},
{
"category": "self",
"summary": "SUSE Bug 1256096",
"url": "https://bugzilla.suse.com/1256096"
},
{
"category": "self",
"summary": "SUSE Bug 1256099",
"url": "https://bugzilla.suse.com/1256099"
},
{
"category": "self",
"summary": "SUSE Bug 1256100",
"url": "https://bugzilla.suse.com/1256100"
},
{
"category": "self",
"summary": "SUSE Bug 1256104",
"url": "https://bugzilla.suse.com/1256104"
},
{
"category": "self",
"summary": "SUSE Bug 1256106",
"url": "https://bugzilla.suse.com/1256106"
},
{
"category": "self",
"summary": "SUSE Bug 1256107",
"url": "https://bugzilla.suse.com/1256107"
},
{
"category": "self",
"summary": "SUSE Bug 1256117",
"url": "https://bugzilla.suse.com/1256117"
},
{
"category": "self",
"summary": "SUSE Bug 1256119",
"url": "https://bugzilla.suse.com/1256119"
},
{
"category": "self",
"summary": "SUSE Bug 1256121",
"url": "https://bugzilla.suse.com/1256121"
},
{
"category": "self",
"summary": "SUSE Bug 1256145",
"url": "https://bugzilla.suse.com/1256145"
},
{
"category": "self",
"summary": "SUSE Bug 1256153",
"url": "https://bugzilla.suse.com/1256153"
},
{
"category": "self",
"summary": "SUSE Bug 1256178",
"url": "https://bugzilla.suse.com/1256178"
},
{
"category": "self",
"summary": "SUSE Bug 1256197",
"url": "https://bugzilla.suse.com/1256197"
},
{
"category": "self",
"summary": "SUSE Bug 1256231",
"url": "https://bugzilla.suse.com/1256231"
},
{
"category": "self",
"summary": "SUSE Bug 1256233",
"url": "https://bugzilla.suse.com/1256233"
},
{
"category": "self",
"summary": "SUSE Bug 1256234",
"url": "https://bugzilla.suse.com/1256234"
},
{
"category": "self",
"summary": "SUSE Bug 1256238",
"url": "https://bugzilla.suse.com/1256238"
},
{
"category": "self",
"summary": "SUSE Bug 1256263",
"url": "https://bugzilla.suse.com/1256263"
},
{
"category": "self",
"summary": "SUSE Bug 1256267",
"url": "https://bugzilla.suse.com/1256267"
},
{
"category": "self",
"summary": "SUSE Bug 1256268",
"url": "https://bugzilla.suse.com/1256268"
},
{
"category": "self",
"summary": "SUSE Bug 1256271",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "self",
"summary": "SUSE Bug 1256273",
"url": "https://bugzilla.suse.com/1256273"
},
{
"category": "self",
"summary": "SUSE Bug 1256274",
"url": "https://bugzilla.suse.com/1256274"
},
{
"category": "self",
"summary": "SUSE Bug 1256279",
"url": "https://bugzilla.suse.com/1256279"
},
{
"category": "self",
"summary": "SUSE Bug 1256285",
"url": "https://bugzilla.suse.com/1256285"
},
{
"category": "self",
"summary": "SUSE Bug 1256291",
"url": "https://bugzilla.suse.com/1256291"
},
{
"category": "self",
"summary": "SUSE Bug 1256292",
"url": "https://bugzilla.suse.com/1256292"
},
{
"category": "self",
"summary": "SUSE Bug 1256300",
"url": "https://bugzilla.suse.com/1256300"
},
{
"category": "self",
"summary": "SUSE Bug 1256301",
"url": "https://bugzilla.suse.com/1256301"
},
{
"category": "self",
"summary": "SUSE Bug 1256302",
"url": "https://bugzilla.suse.com/1256302"
},
{
"category": "self",
"summary": "SUSE Bug 1256335",
"url": "https://bugzilla.suse.com/1256335"
},
{
"category": "self",
"summary": "SUSE Bug 1256348",
"url": "https://bugzilla.suse.com/1256348"
},
{
"category": "self",
"summary": "SUSE Bug 1256351",
"url": "https://bugzilla.suse.com/1256351"
},
{
"category": "self",
"summary": "SUSE Bug 1256354",
"url": "https://bugzilla.suse.com/1256354"
},
{
"category": "self",
"summary": "SUSE Bug 1256358",
"url": "https://bugzilla.suse.com/1256358"
},
{
"category": "self",
"summary": "SUSE Bug 1256361",
"url": "https://bugzilla.suse.com/1256361"
},
{
"category": "self",
"summary": "SUSE Bug 1256364",
"url": "https://bugzilla.suse.com/1256364"
},
{
"category": "self",
"summary": "SUSE Bug 1256367",
"url": "https://bugzilla.suse.com/1256367"
},
{
"category": "self",
"summary": "SUSE Bug 1256368",
"url": "https://bugzilla.suse.com/1256368"
},
{
"category": "self",
"summary": "SUSE Bug 1256369",
"url": "https://bugzilla.suse.com/1256369"
},
{
"category": "self",
"summary": "SUSE Bug 1256370",
"url": "https://bugzilla.suse.com/1256370"
},
{
"category": "self",
"summary": "SUSE Bug 1256371",
"url": "https://bugzilla.suse.com/1256371"
},
{
"category": "self",
"summary": "SUSE Bug 1256373",
"url": "https://bugzilla.suse.com/1256373"
},
{
"category": "self",
"summary": "SUSE Bug 1256375",
"url": "https://bugzilla.suse.com/1256375"
},
{
"category": "self",
"summary": "SUSE Bug 1256379",
"url": "https://bugzilla.suse.com/1256379"
},
{
"category": "self",
"summary": "SUSE Bug 1256387",
"url": "https://bugzilla.suse.com/1256387"
},
{
"category": "self",
"summary": "SUSE Bug 1256394",
"url": "https://bugzilla.suse.com/1256394"
},
{
"category": "self",
"summary": "SUSE Bug 1256395",
"url": "https://bugzilla.suse.com/1256395"
},
{
"category": "self",
"summary": "SUSE Bug 1256396",
"url": "https://bugzilla.suse.com/1256396"
},
{
"category": "self",
"summary": "SUSE Bug 1256528",
"url": "https://bugzilla.suse.com/1256528"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53743 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53750 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53759 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53762 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53766 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53768 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53777 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53778 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53782 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53784 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53785 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53787 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53791 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53792 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53793 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53794 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53795 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53797 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53799 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53807 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53808 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53813 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53815 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53819 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53821 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53823 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53823/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53825 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53825/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53828 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53831 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53834 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53836 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53839 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53841 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53842 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53843 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53844 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53844/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53846 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53847 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53848 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53850 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53851 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53852 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53856 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53857 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53858 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53860 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53861 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53863 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53864 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53865 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53992 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53994 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53995 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53996 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53997 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53999 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54000 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54001 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54005 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54006 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54008 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54014 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54016 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54017 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54019 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54022 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54022/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54025 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54026 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54027 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54030 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54031 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54032 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54035 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54037 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54038 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54042 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54048 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54049 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54051 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54052 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54060 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54064 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54066 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54067 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54069 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54070 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54072 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54076 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54080 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54081 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54083 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54088 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54089 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54091 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54092 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54093 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54094 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54095 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54096 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54099 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54101 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54104 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54106 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54112 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54113 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54115 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54117 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54121 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54125 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54127 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54133 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54134 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54135 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54136 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54137 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54140 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54141 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54142 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54143 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54145 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54148 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54149 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54153 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54154 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54155 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54156 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54164 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54166 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54169 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54170 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54171 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54172 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54173 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54177 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54178 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54179 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54181 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54183 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54185 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54189 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54194 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54201 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54204 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54207 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54209 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54210 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54211 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54215 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54219 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54220 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54221 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54223 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54224 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54225 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54227 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54229 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54230 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54235 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54240 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54241 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54246 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54247 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54251 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54253 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54254 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54255 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54258 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54261 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54263 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54264 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54266 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54267 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54267/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54271 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54276 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54278 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54281 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54282 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54283 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54285 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54291 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54292 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54293 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54296 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54297 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54299 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54300 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54302 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54303 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54304 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54309 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54312 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54313 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54314 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54315 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54316 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54324 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54326 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26944 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39890 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39977 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40042 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40167 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40179 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40211 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40215 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40219 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40220 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40223 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40242 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40242/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40244 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40258 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40262 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40263 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40269 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40272 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40273 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40273/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40275 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40277 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40280 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40282 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40284 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40288 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40297 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40301 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40304 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40306 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40308 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40309 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40310 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40311 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40312 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40314 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40315 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40316 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40317 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40318 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40320 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40322 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40323 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40324 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40328 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40329 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40331 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40342 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40343 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40345 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68217 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68218 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68237 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68238 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68244 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68249 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68252 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68257 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68258 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68259 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68286 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68287 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68289 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68290 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68303 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68305 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68307 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68308 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68312 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68313 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68328 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68330 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68331 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68332 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68335 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68335/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68339 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68345 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68346 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68347 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68354 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68362 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68380 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68734 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68740 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68746 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68750 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68757 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68758 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68759 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68765 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68766 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68766/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-26T11:36:42Z",
"generator": {
"date": "2026-01-26T11:36:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0293-1",
"initial_release_date": "2026-01-26T11:36:42Z",
"revision_history": [
{
"date": "2026-01-26T11:36:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.84.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-source-6.4.0-150600.23.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.84.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.84.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-altera-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-amd-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-apm-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-apple-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-arm-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-lg-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-debug-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.4.0-150600.23.84.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-42752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42752"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42752",
"url": "https://www.suse.com/security/cve/CVE-2023-42752"
},
{
"category": "external",
"summary": "SUSE Bug 1215146 for CVE-2023-42752",
"url": "https://bugzilla.suse.com/1215146"
},
{
"category": "external",
"summary": "SUSE Bug 1215468 for CVE-2023-42752",
"url": "https://bugzilla.suse.com/1215468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-42752"
},
{
"cve": "CVE-2023-53743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Free released resource after coalescing\n\nrelease_resource() doesn\u0027t actually free the resource or resource list\nentry so free the resource list entry to avoid a leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53743",
"url": "https://www.suse.com/security/cve/CVE-2023-53743"
},
{
"category": "external",
"summary": "SUSE Bug 1254782 for CVE-2023-53743",
"url": "https://bugzilla.suse.com/1254782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53743"
},
{
"cve": "CVE-2023-53750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53750"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: freescale: Fix a memory out of bounds when num_configs is 1\n\nThe config passed in by pad wakeup is 1, when num_configs is 1,\nConfiguration [1] should not be fetched, which will be detected\nby KASAN as a memory out of bounds condition. Modify to get\nconfigs[1] when num_configs is 2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53750",
"url": "https://www.suse.com/security/cve/CVE-2023-53750"
},
{
"category": "external",
"summary": "SUSE Bug 1254611 for CVE-2023-53750",
"url": "https://bugzilla.suse.com/1254611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53750"
},
{
"cve": "CVE-2023-53752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: deal with integer overflows in kmalloc_reserve()\n\nBlamed commit changed:\n ptr = kmalloc(size);\n if (ptr)\n size = ksize(ptr);\n\n size = kmalloc_size_roundup(size);\n ptr = kmalloc(size);\n\nThis allowed various crash as reported by syzbot [1]\nand Kyle Zeng.\n\nProblem is that if @size is bigger than 0x80000001,\nkmalloc_size_roundup(size) returns 2^32.\n\nkmalloc_reserve() uses a 32bit variable (obj_size),\nso 2^32 is truncated to 0.\n\nkmalloc(0) returns ZERO_SIZE_PTR which is not handled by\nskb allocations.\n\nFollowing trace can be triggered if a netdev-\u003emtu is set\nclose to 0x7fffffff\n\nWe might in the future limit netdev-\u003emtu to more sensible\nlimit (like KMALLOC_MAX_SIZE).\n\nThis patch is based on a syzbot report, and also a report\nand tentative fix from Kyle Zeng.\n\n[1]\nBUG: KASAN: user-memory-access in __build_skb_around net/core/skbuff.c:294 [inline]\nBUG: KASAN: user-memory-access in __alloc_skb+0x3c4/0x6e8 net/core/skbuff.c:527\nWrite of size 32 at addr 00000000fffffd10 by task syz-executor.4/22554\n\nCPU: 1 PID: 22554 Comm: syz-executor.4 Not tainted 6.1.39-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023\nCall trace:\ndump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:279\nshow_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:286\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0x120/0x1a0 lib/dump_stack.c:106\nprint_report+0xe4/0x4b4 mm/kasan/report.c:398\nkasan_report+0x150/0x1ac mm/kasan/report.c:495\nkasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189\nmemset+0x40/0x70 mm/kasan/shadow.c:44\n__build_skb_around net/core/skbuff.c:294 [inline]\n__alloc_skb+0x3c4/0x6e8 net/core/skbuff.c:527\nalloc_skb include/linux/skbuff.h:1316 [inline]\nigmpv3_newpack+0x104/0x1088 net/ipv4/igmp.c:359\nadd_grec+0x81c/0x1124 net/ipv4/igmp.c:534\nigmpv3_send_cr net/ipv4/igmp.c:667 [inline]\nigmp_ifc_timer_expire+0x1b0/0x1008 net/ipv4/igmp.c:810\ncall_timer_fn+0x1c0/0x9f0 kernel/time/timer.c:1474\nexpire_timers kernel/time/timer.c:1519 [inline]\n__run_timers+0x54c/0x710 kernel/time/timer.c:1790\nrun_timer_softirq+0x28/0x4c kernel/time/timer.c:1803\n_stext+0x380/0xfbc\n____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79\ncall_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:891\ndo_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84\ninvoke_softirq kernel/softirq.c:437 [inline]\n__irq_exit_rcu+0x1c0/0x4cc kernel/softirq.c:683\nirq_exit_rcu+0x14/0x78 kernel/softirq.c:695\nel0_interrupt+0x7c/0x2e0 arch/arm64/kernel/entry-common.c:717\n__el0_irq_handler_common+0x18/0x24 arch/arm64/kernel/entry-common.c:724\nel0t_64_irq_handler+0x10/0x1c arch/arm64/kernel/entry-common.c:729\nel0t_64_irq+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53752",
"url": "https://www.suse.com/security/cve/CVE-2023-53752"
},
{
"category": "external",
"summary": "SUSE Bug 1254613 for CVE-2023-53752",
"url": "https://bugzilla.suse.com/1254613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53752"
},
{
"cve": "CVE-2023-53759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hidraw: fix data race on device refcount\n\nThe hidraw_open() function increments the hidraw device reference\ncounter. The counter has no dedicated synchronization mechanism,\nresulting in a potential data race when concurrently opening a device.\n\nThe race is a regression introduced by commit 8590222e4b02 (\"HID:\nhidraw: Replace hidraw device table mutex with a rwsem\"). While\nminors_rwsem is intended to protect the hidraw_table itself, by instead\nacquiring the lock for writing, the reference counter is also protected.\nThis is symmetrical to hidraw_release().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53759",
"url": "https://www.suse.com/security/cve/CVE-2023-53759"
},
{
"category": "external",
"summary": "SUSE Bug 1254663 for CVE-2023-53759",
"url": "https://bugzilla.suse.com/1254663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53759"
},
{
"cve": "CVE-2023-53762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53762"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync\n\nUse-after-free can occur in hci_disconnect_all_sync if a connection is\ndeleted by concurrent processing of a controller event.\n\nTo prevent this the code now tries to iterate over the list backwards\nto ensure the links are cleanup before its parents, also it no longer\nrelies on a cursor, instead it always uses the last element since\nhci_abort_conn_sync is guaranteed to call hci_conn_del.\n\nUAF crash log:\n==================================================================\nBUG: KASAN: slab-use-after-free in hci_set_powered_sync\n(net/bluetooth/hci_sync.c:5424) [bluetooth]\nRead of size 8 at addr ffff888009d9c000 by task kworker/u9:0/124\n\nCPU: 0 PID: 124 Comm: kworker/u9:0 Tainted: G W\n6.5.0-rc1+ #10\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n1.16.2-1.fc38 04/01/2014\nWorkqueue: hci0 hci_cmd_sync_work [bluetooth]\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x5b/0x90\n print_report+0xcf/0x670\n ? __virt_addr_valid+0xdd/0x160\n ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n kasan_report+0xa6/0xe0\n ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]\n hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n ? __pfx_hci_set_powered_sync+0x10/0x10 [bluetooth]\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]\n hci_cmd_sync_work+0x137/0x220 [bluetooth]\n process_one_work+0x526/0x9d0\n ? __pfx_process_one_work+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n ? mark_held_locks+0x1a/0x90\n worker_thread+0x92/0x630\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x196/0x1e0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2c/0x50\n \u003c/TASK\u003e\n\nAllocated by task 1782:\n kasan_save_stack+0x33/0x60\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x8f/0xa0\n hci_conn_add+0xa5/0xa80 [bluetooth]\n hci_bind_cis+0x881/0x9b0 [bluetooth]\n iso_connect_cis+0x121/0x520 [bluetooth]\n iso_sock_connect+0x3f6/0x790 [bluetooth]\n __sys_connect+0x109/0x130\n __x64_sys_connect+0x40/0x50\n do_syscall_64+0x60/0x90\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nFreed by task 695:\n kasan_save_stack+0x33/0x60\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2b/0x50\n __kasan_slab_free+0x10a/0x180\n __kmem_cache_free+0x14d/0x2e0\n device_release+0x5d/0xf0\n kobject_put+0xdf/0x270\n hci_disconn_complete_evt+0x274/0x3a0 [bluetooth]\n hci_event_packet+0x579/0x7e0 [bluetooth]\n hci_rx_work+0x287/0xaa0 [bluetooth]\n process_one_work+0x526/0x9d0\n worker_thread+0x92/0x630\n kthread+0x196/0x1e0\n ret_from_fork+0x2c/0x50\n==================================================================",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53762",
"url": "https://www.suse.com/security/cve/CVE-2023-53762"
},
{
"category": "external",
"summary": "SUSE Bug 1254606 for CVE-2023-53762",
"url": "https://bugzilla.suse.com/1254606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53762"
},
{
"cve": "CVE-2023-53766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53766"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nFS: JFS: Check for read-only mounted filesystem in txBegin\n\n This patch adds a check for read-only mounted filesystem\n in txBegin before starting a transaction potentially saving\n from NULL pointer deref.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53766",
"url": "https://www.suse.com/security/cve/CVE-2023-53766"
},
{
"category": "external",
"summary": "SUSE Bug 1255005 for CVE-2023-53766",
"url": "https://bugzilla.suse.com/1255005"
},
{
"category": "external",
"summary": "SUSE Bug 1255006 for CVE-2023-53766",
"url": "https://bugzilla.suse.com/1255006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-53766"
},
{
"cve": "CVE-2023-53768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap-irq: Fix out-of-bounds access when allocating config buffers\n\nWhen allocating the 2D array for handling IRQ type registers in\nregmap_add_irq_chip_fwnode(), the intent is to allocate a matrix\nwith num_config_bases rows and num_config_regs columns.\n\nThis is currently handled by allocating a buffer to hold a pointer for\neach row (i.e. num_config_bases). After that, the logic attempts to\nallocate the memory required to hold the register configuration for\neach row. However, instead of doing this allocation for each row\n(i.e. num_config_bases allocations), the logic erroneously does this\nallocation num_config_regs number of times.\n\nThis scenario can lead to out-of-bounds accesses when num_config_regs\nis greater than num_config_bases. Fix this by updating the terminating\ncondition of the loop that allocates the memory for holding the register\nconfiguration to allocate memory only for each row in the matrix.\n\nAmit Pundir reported a crash that was occurring on his db845c device\ndue to memory corruption (see \"Closes\" tag for Amit\u0027s report). The KASAN\nreport below helped narrow it down to this issue:\n\n[ 14.033877][ T1] ==================================================================\n[ 14.042507][ T1] BUG: KASAN: invalid-access in regmap_add_irq_chip_fwnode+0x594/0x1364\n[ 14.050796][ T1] Write of size 8 at addr 06ffff8081021850 by task init/1\n\n[ 14.242004][ T1] The buggy address belongs to the object at ffffff8081021850\n[ 14.242004][ T1] which belongs to the cache kmalloc-8 of size 8\n[ 14.255669][ T1] The buggy address is located 0 bytes inside of\n[ 14.255669][ T1] 8-byte region [ffffff8081021850, ffffff8081021858)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53768",
"url": "https://www.suse.com/security/cve/CVE-2023-53768"
},
{
"category": "external",
"summary": "SUSE Bug 1254599 for CVE-2023-53768",
"url": "https://bugzilla.suse.com/1254599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53768"
},
{
"cve": "CVE-2023-53777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53777"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: kill hooked chains to avoid loops on deduplicated compressed images\n\nAfter heavily stressing EROFS with several images which include a\nhand-crafted image of repeated patterns for more than 46 days, I found\ntwo chains could be linked with each other almost simultaneously and\nform a loop so that the entire loop won\u0027t be submitted. As a\nconsequence, the corresponding file pages will remain locked forever.\n\nIt can be _only_ observed on data-deduplicated compressed images.\nFor example, consider two chains with five pclusters in total:\n\tChain 1: 2-\u003e3-\u003e4-\u003e5 -- The tail pcluster is 5;\n Chain 2: 5-\u003e1-\u003e2 -- The tail pcluster is 2.\n\nChain 2 could link to Chain 1 with pcluster 5; and Chain 1 could link\nto Chain 2 at the same time with pcluster 2.\n\nSince hooked chains are all linked locklessly now, I have no idea how\nto simply avoid the race. Instead, let\u0027s avoid hooked chains completely\nuntil I could work out a proper way to fix this and end users finally\ntell us that it\u0027s needed to add it back.\n\nActually, this optimization can be found with multi-threaded workloads\n(especially even more often on deduplicated compressed images), yet I\u0027m\nnot sure about the overall system impacts of not having this compared\nwith implementation complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53777",
"url": "https://www.suse.com/security/cve/CVE-2023-53777"
},
{
"category": "external",
"summary": "SUSE Bug 1254749 for CVE-2023-53777",
"url": "https://bugzilla.suse.com/1254749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53777"
},
{
"cve": "CVE-2023-53778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53778"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Clean up integer overflow checking in map_user_pages()\n\nThe encode_dma() function has some validation on in_trans-\u003esize but it\nwould be more clear to move those checks to find_and_map_user_pages().\n\nThe encode_dma() had two checks:\n\n\tif (in_trans-\u003eaddr + in_trans-\u003esize \u003c in_trans-\u003eaddr || !in_trans-\u003esize)\n\t\treturn -EINVAL;\n\nThe in_trans-\u003eaddr variable is the starting address. The in_trans-\u003esize\nvariable is the total size of the transfer. The transfer can occur in\nparts and the resources-\u003exferred_dma_size tracks how many bytes we have\nalready transferred.\n\nThis patch introduces a new variable \"remaining\" which represents the\namount we want to transfer (in_trans-\u003esize) minus the amount we have\nalready transferred (resources-\u003exferred_dma_size).\n\nI have modified the check for if in_trans-\u003esize is zero to instead check\nif in_trans-\u003esize is less than resources-\u003exferred_dma_size. If we have\nalready transferred more bytes than in_trans-\u003esize then there are negative\nbytes remaining which doesn\u0027t make sense. If there are zero bytes\nremaining to be copied, just return success.\n\nThe check in encode_dma() checked that \"addr + size\" could not overflow\nand barring a driver bug that should work, but it\u0027s easier to check if\nwe do this in parts. First check that \"in_trans-\u003eaddr +\nresources-\u003exferred_dma_size\" is safe. Then check that \"xfer_start_addr +\nremaining\" is safe.\n\nMy final concern was that we are dealing with u64 values but on 32bit\nsystems the kmalloc() function will truncate the sizes to 32 bits. So\nI calculated \"total = in_trans-\u003esize + offset_in_page(xfer_start_addr);\"\nand returned -EINVAL if it were \u003e= SIZE_MAX. This will not affect 64bit\nsystems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53778",
"url": "https://www.suse.com/security/cve/CVE-2023-53778"
},
{
"category": "external",
"summary": "SUSE Bug 1254761 for CVE-2023-53778",
"url": "https://bugzilla.suse.com/1254761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53778"
},
{
"cve": "CVE-2023-53782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53782"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp: Fix out of bounds access in DCCP error handler\n\nThere was a previous attempt to fix an out-of-bounds access in the DCCP\nerror handlers, but that fix assumed that the error handlers only want\nto access the first 8 bytes of the DCCP header. Actually, they also look\nat the DCCP sequence number, which is stored beyond 8 bytes, so an\nexplicit pskb_may_pull() is required.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53782",
"url": "https://www.suse.com/security/cve/CVE-2023-53782"
},
{
"category": "external",
"summary": "SUSE Bug 1254758 for CVE-2023-53782",
"url": "https://bugzilla.suse.com/1254758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53782"
},
{
"cve": "CVE-2023-53784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53784"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge: dw_hdmi: fix connector access for scdc\n\nCommit 5d844091f237 (\"drm/scdc-helper: Pimp SCDC debugs\") changed the scdc\ninterface to pick up an i2c adapter from a connector instead. However, in\nthe case of dw-hdmi, the wrong connector was being used to pass i2c adapter\ninformation, since dw-hdmi\u0027s embedded connector structure is only populated\nwhen the bridge attachment callback explicitly asks for it.\n\ndrm-meson is handling connector creation, so this won\u0027t happen, leading to\na NULL pointer dereference.\n\nFix it by having scdc functions access dw-hdmi\u0027s current connector pointer\ninstead, which is assigned during the bridge enablement stage.\n\n[narmstrong: moved Fixes tag before first S-o-b and added Reported-by tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53784",
"url": "https://www.suse.com/security/cve/CVE-2023-53784"
},
{
"category": "external",
"summary": "SUSE Bug 1254765 for CVE-2023-53784",
"url": "https://bugzilla.suse.com/1254765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53784"
},
{
"cve": "CVE-2023-53785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7921: don\u0027t assume adequate headroom for SDIO headers\n\nmt7921_usb_sdio_tx_prepare_skb() calls mt7921_usb_sdio_write_txwi() and\nmt7921_skb_add_usb_sdio_hdr(), both of which blindly assume that\nadequate headroom will be available in the passed skb. This assumption\ntypically is satisfied when the skb was allocated in the net core for\ntransmission via the mt7921 netdev (although even that is only an\noptimization and is not strictly guaranteed), but the assumption is\nsometimes not satisfied when the skb originated in the receive path of\nanother netdev and was passed through to the mt7921, such as by the\nbridge layer. Blindly prepending bytes to an skb is always wrong.\n\nThis commit introduces a call to skb_cow_head() before the call to\nmt7921_usb_sdio_write_txwi() in mt7921_usb_sdio_tx_prepare_skb() to\nensure that at least MT_SDIO_TXD_SIZE + MT_SDIO_HDR_SIZE bytes can be\npushed onto the skb.\n\nWithout this fix, I can trivially cause kernel panics by bridging an\nMT7921AU-based USB 802.11ax interface with an Ethernet interface on an\nIntel Atom-based x86 system using its onboard RTL8169 PCI Ethernet\nadapter and also on an ARM-based Raspberry Pi 1 using its onboard\nSMSC9512 USB Ethernet adapter. Note that the panics do not occur in\nevery system configuration, as they occur only if the receiving netdev\nleaves less headroom in its received skbs than the mt7921 needs for its\nSDIO headers.\n\nHere is an example stack trace of this panic on Raspberry Pi OS Lite\n2023-02-21 running kernel 6.1.24+ [1]:\n\n skb_panic from skb_push+0x44/0x48\n skb_push from mt7921_usb_sdio_tx_prepare_skb+0xd4/0x190 [mt7921_common]\n mt7921_usb_sdio_tx_prepare_skb [mt7921_common] from mt76u_tx_queue_skb+0x94/0x1d0 [mt76_usb]\n mt76u_tx_queue_skb [mt76_usb] from __mt76_tx_queue_skb+0x4c/0xc8 [mt76]\n __mt76_tx_queue_skb [mt76] from mt76_txq_schedule.part.0+0x13c/0x398 [mt76]\n mt76_txq_schedule.part.0 [mt76] from mt76_txq_schedule_all+0x24/0x30 [mt76]\n mt76_txq_schedule_all [mt76] from mt7921_tx_worker+0x58/0xf4 [mt7921_common]\n mt7921_tx_worker [mt7921_common] from __mt76_worker_fn+0x9c/0xec [mt76]\n __mt76_worker_fn [mt76] from kthread+0xbc/0xe0\n kthread from ret_from_fork+0x14/0x34\n\nAfter this fix, bridging the mt7921 interface works fine on both of my\npreviously problematic systems.\n\n[1] https://github.com/raspberrypi/firmware/tree/5c276f55a4b21345cd4d6200a504ee991851ff7a",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53785",
"url": "https://www.suse.com/security/cve/CVE-2023-53785"
},
{
"category": "external",
"summary": "SUSE Bug 1254918 for CVE-2023-53785",
"url": "https://bugzilla.suse.com/1254918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53785"
},
{
"cve": "CVE-2023-53787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53787"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: da9063: fix null pointer deref with partial DT config\n\nWhen some of the da9063 regulators do not have corresponding DT nodes\na null pointer dereference occurs on boot because such regulators have\nno init_data causing the pointers calculated in\nda9063_check_xvp_constraints() to be invalid.\n\nDo not dereference them in this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53787",
"url": "https://www.suse.com/security/cve/CVE-2023-53787"
},
{
"category": "external",
"summary": "SUSE Bug 1254750 for CVE-2023-53787",
"url": "https://bugzilla.suse.com/1254750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53787"
},
{
"cve": "CVE-2023-53791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix warning for holder mismatch from export_rdev()\n\nCommit a1d767191096 (\"md: use mddev-\u003eexternal to select holder in\nexport_rdev()\") fix the problem that \u0027claim_rdev\u0027 is used for\nblkdev_get_by_dev() while \u0027rdev\u0027 is used for blkdev_put().\n\nHowever, if mddev-\u003eexternal is changed from 0 to 1, then \u0027rdev\u0027 is used\nfor blkdev_get_by_dev() while \u0027claim_rdev\u0027 is used for blkdev_put(). And\nthis problem can be reporduced reliably by following:\n\nNew file: mdadm/tests/23rdev-lifetime\n\ndevname=${dev0##*/}\ndevt=`cat /sys/block/$devname/dev`\npid=\"\"\nruntime=2\n\nclean_up_test() {\n pill -9 $pid\n echo clear \u003e /sys/block/md0/md/array_state\n}\n\ntrap \u0027clean_up_test\u0027 EXIT\n\nadd_by_sysfs() {\n while true; do\n echo $devt \u003e /sys/block/md0/md/new_dev\n done\n}\n\nremove_by_sysfs(){\n while true; do\n echo remove \u003e /sys/block/md0/md/dev-${devname}/state\n done\n}\n\necho md0 \u003e /sys/module/md_mod/parameters/new_array || die \"create md0 failed\"\n\nadd_by_sysfs \u0026\npid=\"$pid $!\"\n\nremove_by_sysfs \u0026\npid=\"$pid $!\"\n\nsleep $runtime\nexit 0\n\nTest cmd:\n\n./test --save-logs --logdir=/tmp/ --keep-going --dev=loop --tests=23rdev-lifetime\n\nTest result:\n\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 960 at block/bdev.c:618 blkdev_put+0x27c/0x330\nModules linked in: multipath md_mod loop\nCPU: 0 PID: 960 Comm: test Not tainted 6.5.0-rc2-00121-g01e55c376936-dirty #50\nRIP: 0010:blkdev_put+0x27c/0x330\nCall Trace:\n \u003cTASK\u003e\n export_rdev.isra.23+0x50/0xa0 [md_mod]\n mddev_unlock+0x19d/0x300 [md_mod]\n rdev_attr_store+0xec/0x190 [md_mod]\n sysfs_kf_write+0x52/0x70\n kernfs_fop_write_iter+0x19a/0x2a0\n vfs_write+0x3b5/0x770\n ksys_write+0x74/0x150\n __x64_sys_write+0x22/0x30\n do_syscall_64+0x40/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFix the problem by recording if \u0027rdev\u0027 is used as holder.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53791",
"url": "https://www.suse.com/security/cve/CVE-2023-53791"
},
{
"category": "external",
"summary": "SUSE Bug 1254742 for CVE-2023-53791",
"url": "https://bugzilla.suse.com/1254742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53791"
},
{
"cve": "CVE-2023-53792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53792"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-core: fix memory leak in dhchap_ctrl_secret\n\nFree dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we\nreturn when nvme_auth_generate_key() returns error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53792",
"url": "https://www.suse.com/security/cve/CVE-2023-53792"
},
{
"category": "external",
"summary": "SUSE Bug 1254743 for CVE-2023-53792",
"url": "https://bugzilla.suse.com/1254743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53792"
},
{
"cve": "CVE-2023-53793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf tool x86: Fix perf_env memory leak\n\nFound by leak sanitizer:\n```\n==1632594==ERROR: LeakSanitizer: detected memory leaks\n\nDirect leak of 21 byte(s) in 1 object(s) allocated from:\n #0 0x7f2953a7077b in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:439\n #1 0x556701d6fbbf in perf_env__read_cpuid util/env.c:369\n #2 0x556701d70589 in perf_env__cpuid util/env.c:465\n #3 0x55670204bba2 in x86__is_amd_cpu arch/x86/util/env.c:14\n #4 0x5567020487a2 in arch__post_evsel_config arch/x86/util/evsel.c:83\n #5 0x556701d8f78b in evsel__config util/evsel.c:1366\n #6 0x556701ef5872 in evlist__config util/record.c:108\n #7 0x556701cd6bcd in test__PERF_RECORD tests/perf-record.c:112\n #8 0x556701cacd07 in run_test tests/builtin-test.c:236\n #9 0x556701cacfac in test_and_print tests/builtin-test.c:265\n #10 0x556701cadddb in __cmd_test tests/builtin-test.c:402\n #11 0x556701caf2aa in cmd_test tests/builtin-test.c:559\n #12 0x556701d3b557 in run_builtin tools/perf/perf.c:323\n #13 0x556701d3bac8 in handle_internal_command tools/perf/perf.c:377\n #14 0x556701d3be90 in run_argv tools/perf/perf.c:421\n #15 0x556701d3c3f8 in main tools/perf/perf.c:537\n #16 0x7f2952a46189 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58\n\nSUMMARY: AddressSanitizer: 21 byte(s) leaked in 1 allocation(s).\n```",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53793",
"url": "https://www.suse.com/security/cve/CVE-2023-53793"
},
{
"category": "external",
"summary": "SUSE Bug 1254739 for CVE-2023-53793",
"url": "https://bugzilla.suse.com/1254739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53793"
},
{
"cve": "CVE-2023-53794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix session state check in reconnect to avoid use-after-free issue\n\nDon\u0027t collect exiting session in smb2_reconnect_server(), because it\nwill be released soon.\n\nNote that the exiting session will stay in server-\u003esmb_ses_list until\nit complete the cifs_free_ipc() and logoff() and then delete itself\nfrom the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53794",
"url": "https://www.suse.com/security/cve/CVE-2023-53794"
},
{
"category": "external",
"summary": "SUSE Bug 1255163 for CVE-2023-53794",
"url": "https://bugzilla.suse.com/1255163"
},
{
"category": "external",
"summary": "SUSE Bug 1255235 for CVE-2023-53794",
"url": "https://bugzilla.suse.com/1255235"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-53794"
},
{
"cve": "CVE-2023-53795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53795"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: IOMMUFD_DESTROY should not increase the refcount\n\nsyzkaller found a race where IOMMUFD_DESTROY increments the refcount:\n\n obj = iommufd_get_object(ucmd-\u003eictx, cmd-\u003eid, IOMMUFD_OBJ_ANY);\n if (IS_ERR(obj))\n return PTR_ERR(obj);\n iommufd_ref_to_users(obj);\n /* See iommufd_ref_to_users() */\n if (!iommufd_object_destroy_user(ucmd-\u003eictx, obj))\n\nAs part of the sequence to join the two existing primitives together.\n\nAllowing the refcount the be elevated without holding the destroy_rwsem\nviolates the assumption that all temporary refcount elevations are\nprotected by destroy_rwsem. Racing IOMMUFD_DESTROY with\niommufd_object_destroy_user() will cause spurious failures:\n\n WARNING: CPU: 0 PID: 3076 at drivers/iommu/iommufd/device.c:477 iommufd_access_destroy+0x18/0x20 drivers/iommu/iommufd/device.c:478\n Modules linked in:\n CPU: 0 PID: 3076 Comm: syz-executor.0 Not tainted 6.3.0-rc1-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023\n RIP: 0010:iommufd_access_destroy+0x18/0x20 drivers/iommu/iommufd/device.c:477\n Code: e8 3d 4e 00 00 84 c0 74 01 c3 0f 0b c3 0f 1f 44 00 00 f3 0f 1e fa 48 89 fe 48 8b bf a8 00 00 00 e8 1d 4e 00 00 84 c0 74 01 c3 \u003c0f\u003e 0b c3 0f 1f 44 00 00 41 57 41 56 41 55 4c 8d ae d0 00 00 00 41\n RSP: 0018:ffffc90003067e08 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888109ea0300 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00000000ffffffff\n RBP: 0000000000000004 R08: 0000000000000000 R09: ffff88810bbb3500\n R10: ffff88810bbb3e48 R11: 0000000000000000 R12: ffffc90003067e88\n R13: ffffc90003067ea8 R14: ffff888101249800 R15: 00000000fffffffe\n FS: 00007ff7254fe6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000555557262da8 CR3: 000000010a6fd000 CR4: 0000000000350ef0\n Call Trace:\n \u003cTASK\u003e\n iommufd_test_create_access drivers/iommu/iommufd/selftest.c:596 [inline]\n iommufd_test+0x71c/0xcf0 drivers/iommu/iommufd/selftest.c:813\n iommufd_fops_ioctl+0x10f/0x1b0 drivers/iommu/iommufd/main.c:337\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x84/0xc0 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe solution is to not increment the refcount on the IOMMUFD_DESTROY path\nat all. Instead use the xa_lock to serialize everything. The refcount\ncheck == 1 and xa_erase can be done under a single critical region. This\navoids the need for any refcount incrementing.\n\nIt has the downside that if userspace races destroy with other operations\nit will get an EBUSY instead of waiting, but this is kind of racing is\nalready dangerous.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53795",
"url": "https://www.suse.com/security/cve/CVE-2023-53795"
},
{
"category": "external",
"summary": "SUSE Bug 1254737 for CVE-2023-53795",
"url": "https://bugzilla.suse.com/1254737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53795"
},
{
"cve": "CVE-2023-53797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53797"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: wacom: Use ktime_t rather than int when dealing with timestamps\n\nCode which interacts with timestamps needs to use the ktime_t type\nreturned by functions like ktime_get. The int type does not offer\nenough space to store these values, and attempting to use it is a\nrecipe for problems. In this particular case, overflows would occur\nwhen calculating/storing timestamps leading to incorrect values being\nreported to userspace. In some cases these bad timestamps cause input\nhandling in userspace to appear hung.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53797",
"url": "https://www.suse.com/security/cve/CVE-2023-53797"
},
{
"category": "external",
"summary": "SUSE Bug 1254733 for CVE-2023-53797",
"url": "https://bugzilla.suse.com/1254733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53797"
},
{
"cve": "CVE-2023-53799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53799"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: api - Use work queue in crypto_destroy_instance\n\nThe function crypto_drop_spawn expects to be called in process\ncontext. However, when an instance is unregistered while it still\nhas active users, the last user may cause the instance to be freed\nin atomic context.\n\nFix this by delaying the freeing to a work queue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53799",
"url": "https://www.suse.com/security/cve/CVE-2023-53799"
},
{
"category": "external",
"summary": "SUSE Bug 1254732 for CVE-2023-53799",
"url": "https://bugzilla.suse.com/1254732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53799"
},
{
"cve": "CVE-2023-53807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: clocking-wizard: Fix Oops in clk_wzrd_register_divider()\n\nSmatch detected this potential error pointer dereference\nclk_wzrd_register_divider(). If devm_clk_hw_register() fails then\nit sets \"hw\" to an error pointer and then dereferences it on the\nnext line. Return the error directly instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53807",
"url": "https://www.suse.com/security/cve/CVE-2023-53807"
},
{
"category": "external",
"summary": "SUSE Bug 1254724 for CVE-2023-53807",
"url": "https://bugzilla.suse.com/1254724"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53807"
},
{
"cve": "CVE-2023-53808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53808"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: fix memory leak in mwifiex_histogram_read()\n\nAlways free the zeroed page on return from \u0027mwifiex_histogram_read()\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53808",
"url": "https://www.suse.com/security/cve/CVE-2023-53808"
},
{
"category": "external",
"summary": "SUSE Bug 1254723 for CVE-2023-53808",
"url": "https://bugzilla.suse.com/1254723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53808"
},
{
"cve": "CVE-2023-53813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix rbtree traversal bug in ext4_mb_use_preallocated\n\nDuring allocations, while looking for preallocations(PA) in the per\ninode rbtree, we can\u0027t do a direct traversal of the tree because\next4_mb_discard_group_preallocation() can paralelly mark the pa deleted\nand that can cause direct traversal to skip some entries. This was\nleading to a BUG_ON() being hit [1] when we missed a PA that could satisfy\nour request and ultimately tried to create a new PA that would overlap\nwith the missed one.\n\nTo makes sure we handle that case while still keeping the performance of\nthe rbtree, we make use of the fact that the only pa that could possibly\noverlap the original goal start is the one that satisfies the below\nconditions:\n\n 1. It must have it\u0027s logical start immediately to the left of\n (ie less than) original logical start.\n\n 2. It must not be deleted\n\nTo find this pa we use the following traversal method:\n\n1. Descend into the rbtree normally to find the immediate neighboring\nPA. Here we keep descending irrespective of if the PA is deleted or if\nit overlaps with our request etc. The goal is to find an immediately\nadjacent PA.\n\n2. If the found PA is on right of original goal, use rb_prev() to find\nthe left adjacent PA.\n\n3. Check if this PA is deleted and keep moving left with rb_prev() until\na non deleted PA is found.\n\n4. This is the PA we are looking for. Now we can check if it can satisfy\nthe original request and proceed accordingly.\n\nThis approach also takes care of having deleted PAs in the tree.\n\n(While we are at it, also fix a possible overflow bug in calculating the\nend of a PA)\n\n[1] https://lore.kernel.org/linux-ext4/CA+G9fYv2FRpLqBZf34ZinR8bU2_ZRAUOjKAD3+tKRFaEQHtt8Q@mail.gmail.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53813",
"url": "https://www.suse.com/security/cve/CVE-2023-53813"
},
{
"category": "external",
"summary": "SUSE Bug 1254717 for CVE-2023-53813",
"url": "https://bugzilla.suse.com/1254717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53813"
},
{
"cve": "CVE-2023-53815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53815"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nposix-timers: Prevent RT livelock in itimer_delete()\n\nitimer_delete() has a retry loop when the timer is concurrently expired. On\nnon-RT kernels this just spin-waits until the timer callback has completed,\nexcept for posix CPU timers which have HAVE_POSIX_CPU_TIMERS_TASK_WORK\nenabled.\n\nIn that case and on RT kernels the existing task could live lock when\npreempting the task which does the timer delivery.\n\nReplace spin_unlock() with an invocation of timer_wait_running() to handle\nit the same way as the other retry loops in the posix timer code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53815",
"url": "https://www.suse.com/security/cve/CVE-2023-53815"
},
{
"category": "external",
"summary": "SUSE Bug 1254715 for CVE-2023-53815",
"url": "https://bugzilla.suse.com/1254715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53815"
},
{
"cve": "CVE-2023-53819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdgpu: validate offset_in_bo of drm_amdgpu_gem_va\n\nThis is motivated by OOB access in amdgpu_vm_update_range when\noffset_in_bo+map_size overflows.\n\nv2: keep the validations in amdgpu_vm_bo_map\nv3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map\n rather than to amdgpu_gem_va_ioctl",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53819",
"url": "https://www.suse.com/security/cve/CVE-2023-53819"
},
{
"category": "external",
"summary": "SUSE Bug 1254712 for CVE-2023-53819",
"url": "https://bugzilla.suse.com/1254712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53819"
},
{
"cve": "CVE-2023-53821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_vti: fix slab-use-after-free in decode_session6\n\nWhen ipv6_vti device is set to the qdisc of the sfb type, the cb field\nof the sent skb may be modified during enqueuing. Then,\nslab-use-after-free may occur when ipv6_vti device sends IPv6 packets.\n\nThe stack information is as follows:\nBUG: KASAN: slab-use-after-free in decode_session6+0x103f/0x1890\nRead of size 1 at addr ffff88802e08edc2 by task swapper/0/0\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.0-next-20230707-00001-g84e2cad7f979 #410\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\nCall Trace:\n\u003cIRQ\u003e\ndump_stack_lvl+0xd9/0x150\nprint_address_description.constprop.0+0x2c/0x3c0\nkasan_report+0x11d/0x130\ndecode_session6+0x103f/0x1890\n__xfrm_decode_session+0x54/0xb0\nvti6_tnl_xmit+0x3e6/0x1ee0\ndev_hard_start_xmit+0x187/0x700\nsch_direct_xmit+0x1a3/0xc30\n__qdisc_run+0x510/0x17a0\n__dev_queue_xmit+0x2215/0x3b10\nneigh_connected_output+0x3c2/0x550\nip6_finish_output2+0x55a/0x1550\nip6_finish_output+0x6b9/0x1270\nip6_output+0x1f1/0x540\nndisc_send_skb+0xa63/0x1890\nndisc_send_rs+0x132/0x6f0\naddrconf_rs_timer+0x3f1/0x870\ncall_timer_fn+0x1a0/0x580\nexpire_timers+0x29b/0x4b0\nrun_timer_softirq+0x326/0x910\n__do_softirq+0x1d4/0x905\nirq_exit_rcu+0xb7/0x120\nsysvec_apic_timer_interrupt+0x97/0xc0\n\u003c/IRQ\u003e\nAllocated by task 9176:\nkasan_save_stack+0x22/0x40\nkasan_set_track+0x25/0x30\n__kasan_slab_alloc+0x7f/0x90\nkmem_cache_alloc_node+0x1cd/0x410\nkmalloc_reserve+0x165/0x270\n__alloc_skb+0x129/0x330\nnetlink_sendmsg+0x9b1/0xe30\nsock_sendmsg+0xde/0x190\n____sys_sendmsg+0x739/0x920\n___sys_sendmsg+0x110/0x1b0\n__sys_sendmsg+0xf7/0x1c0\ndo_syscall_64+0x39/0xb0\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nFreed by task 9176:\nkasan_save_stack+0x22/0x40\nkasan_set_track+0x25/0x30\nkasan_save_free_info+0x2b/0x40\n____kasan_slab_free+0x160/0x1c0\nslab_free_freelist_hook+0x11b/0x220\nkmem_cache_free+0xf0/0x490\nskb_free_head+0x17f/0x1b0\nskb_release_data+0x59c/0x850\nconsume_skb+0xd2/0x170\nnetlink_unicast+0x54f/0x7f0\nnetlink_sendmsg+0x926/0xe30\nsock_sendmsg+0xde/0x190\n____sys_sendmsg+0x739/0x920\n___sys_sendmsg+0x110/0x1b0\n__sys_sendmsg+0xf7/0x1c0\ndo_syscall_64+0x39/0xb0\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nThe buggy address belongs to the object at ffff88802e08ed00\nwhich belongs to the cache skbuff_small_head of size 640\nThe buggy address is located 194 bytes inside of\nfreed 640-byte region [ffff88802e08ed00, ffff88802e08ef80)\n\nAs commit f855691975bb (\"xfrm6: Fix the nexthdr offset in\n_decode_session6.\") showed, xfrm_decode_session was originally intended\nonly for the receive path. IP6CB(skb)-\u003enhoff is not set during\ntransmission. Therefore, set the cb field in the skb to 0 before\nsending packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53821",
"url": "https://www.suse.com/security/cve/CVE-2023-53821"
},
{
"category": "external",
"summary": "SUSE Bug 1254669 for CVE-2023-53821",
"url": "https://bugzilla.suse.com/1254669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53821"
},
{
"cve": "CVE-2023-53823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53823"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock/rq_qos: protect rq_qos apis with a new lock\n\ncommit 50e34d78815e (\"block: disable the elevator int del_gendisk\")\nmove rq_qos_exit() from disk_release() to del_gendisk(), this will\nintroduce some problems:\n\n1) If rq_qos_add() is triggered by enabling iocost/iolatency through\n cgroupfs, then it can concurrent with del_gendisk(), it\u0027s not safe to\n write \u0027q-\u003erq_qos\u0027 concurrently.\n\n2) Activate cgroup policy that is relied on rq_qos will call\n rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is\n called in the middle, null-ptr-dereference will be triggered in\n blkcg_activate_policy().\n\n3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the\n disk, then if rq_qos_exit() from del_gendisk() is done before\n rq_qos_add(), then memory will be leaked.\n\nThis patch add a new disk level mutex \u0027rq_qos_mutex\u0027:\n\n1) The lock will protect rq_qos_exit() directly.\n\n2) For wbt that doesn\u0027t relied on blk-cgroup, rq_qos_add() can only be\n called from disk initialization for now because wbt can\u0027t be\n destructed until rq_qos_exit(), so it\u0027s safe not to protect wbt for\n now. Hoever, in case that rq_qos dynamically destruction is supported\n in the furture, this patch also protect rq_qos_add() from wbt_init()\n directly, this is enough because blk-sysfs already synchronize\n writers with disk removal.\n\n3) For iocost and iolatency, in order to synchronize disk removal and\n cgroup configuration, the lock is held after blkdev_get_no_open()\n from blkg_conf_open_bdev(), and is released in blkg_conf_exit().\n In order to fix the above memory leak, disk_live() is checked after\n holding the new lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53823",
"url": "https://www.suse.com/security/cve/CVE-2023-53823"
},
{
"category": "external",
"summary": "SUSE Bug 1254691 for CVE-2023-53823",
"url": "https://bugzilla.suse.com/1254691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53823"
},
{
"cve": "CVE-2023-53825",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53825"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().\n\nsyzkaller found a memory leak in kcm_sendmsg(), and commit c821a88bd720\n(\"kcm: Fix memory leak in error path of kcm_sendmsg()\") suppressed it by\nupdating kcm_tx_msg(head)-\u003elast_skb if partial data is copied so that the\nfollowing sendmsg() will resume from the skb.\n\nHowever, we cannot know how many bytes were copied when we get the error.\nThus, we could mess up the MSG_MORE queue.\n\nWhen kcm_sendmsg() fails for SOCK_DGRAM, we should purge the queue as we\ndo so for UDP by udp_flush_pending_frames().\n\nEven without this change, when the error occurred, the following sendmsg()\nresumed from a wrong skb and the queue was messed up. However, we have\nyet to get such a report, and only syzkaller stumbled on it. So, this\ncan be changed safely.\n\nNote this does not change SOCK_SEQPACKET behaviour.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53825",
"url": "https://www.suse.com/security/cve/CVE-2023-53825"
},
{
"category": "external",
"summary": "SUSE Bug 1254707 for CVE-2023-53825",
"url": "https://bugzilla.suse.com/1254707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53825"
},
{
"cve": "CVE-2023-53828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()\n\nKSAN reports use-after-free in hci_add_adv_monitor().\n\nWhile adding an adv monitor,\n hci_add_adv_monitor() calls -\u003e\n msft_add_monitor_pattern() calls -\u003e\n msft_add_monitor_sync() calls -\u003e\n msft_le_monitor_advertisement_cb() calls in an error case -\u003e\n hci_free_adv_monitor() which frees the *moniter.\n\nThis is referenced by bt_dev_dbg() in hci_add_adv_monitor().\n\nFix the bt_dev_dbg() by using handle instead of monitor-\u003ehandle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53828",
"url": "https://www.suse.com/security/cve/CVE-2023-53828"
},
{
"category": "external",
"summary": "SUSE Bug 1254623 for CVE-2023-53828",
"url": "https://bugzilla.suse.com/1254623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53828"
},
{
"cve": "CVE-2023-53831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: read sk-\u003esk_family once in sk_mc_loop()\n\nsyzbot is playing with IPV6_ADDRFORM quite a lot these days,\nand managed to hit the WARN_ON_ONCE(1) in sk_mc_loop()\n\nWe have many more similar issues to fix.\n\nWARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260\nModules linked in:\nCPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\nWorkqueue: events_power_efficient gc_worker\nRIP: 0010:sk_mc_loop+0x165/0x260 net/core/sock.c:782\nCode: 34 1b fd 49 81 c7 18 05 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 25 36 6d fd 4d 8b 37 eb 13 e8 db 33 1b fd \u003c0f\u003e 0b b3 01 eb 34 e8 d0 33 1b fd 45 31 f6 49 83 c6 38 4c 89 f0 48\nRSP: 0018:ffffc90000388530 EFLAGS: 00010246\nRAX: ffffffff846d9b55 RBX: 0000000000000011 RCX: ffff88814f884980\nRDX: 0000000000000102 RSI: ffffffff87ae5160 RDI: 0000000000000011\nRBP: ffffc90000388550 R08: 0000000000000003 R09: ffffffff846d9a65\nR10: 0000000000000002 R11: ffff88814f884980 R12: dffffc0000000000\nR13: ffff88810dbee000 R14: 0000000000000010 R15: ffff888150084000\nFS: 0000000000000000(0000) GS:ffff8881f6b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000180 CR3: 000000014ee5b000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cIRQ\u003e\n[\u003cffffffff8507734f\u003e] ip6_finish_output2+0x33f/0x1ae0 net/ipv6/ip6_output.c:83\n[\u003cffffffff85062766\u003e] __ip6_finish_output net/ipv6/ip6_output.c:200 [inline]\n[\u003cffffffff85062766\u003e] ip6_finish_output+0x6c6/0xb10 net/ipv6/ip6_output.c:211\n[\u003cffffffff85061f8c\u003e] NF_HOOK_COND include/linux/netfilter.h:298 [inline]\n[\u003cffffffff85061f8c\u003e] ip6_output+0x2bc/0x3d0 net/ipv6/ip6_output.c:232\n[\u003cffffffff852071cf\u003e] dst_output include/net/dst.h:444 [inline]\n[\u003cffffffff852071cf\u003e] ip6_local_out+0x10f/0x140 net/ipv6/output_core.c:161\n[\u003cffffffff83618fb4\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:483 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_queue_xmit+0x1174/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff8361ddd9\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84763fc0\u003e] netdev_start_xmit include/linux/netdevice.h:4925 [inline]\n[\u003cffffffff84763fc0\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84763fc0\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff8494c650\u003e] sch_direct_xmit+0x2a0/0x9c0 net/sched/sch_generic.c:342\n[\u003cffffffff8494d883\u003e] qdisc_restart net/sched/sch_generic.c:407 [inline]\n[\u003cffffffff8494d883\u003e] __qdisc_run+0xb13/0x1e70 net/sched/sch_generic.c:415\n[\u003cffffffff8478c426\u003e] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125\n[\u003cffffffff84796eac\u003e] net_tx_action+0x7ac/0x940 net/core/dev.c:5247\n[\u003cffffffff858002bd\u003e] __do_softirq+0x2bd/0x9bd kernel/softirq.c:599\n[\u003cffffffff814c3fe8\u003e] invoke_softirq kernel/softirq.c:430 [inline]\n[\u003cffffffff814c3fe8\u003e] __irq_exit_rcu+0xc8/0x170 kernel/softirq.c:683\n[\u003cffffffff814c3f09\u003e] irq_exit_rcu+0x9/0x20 kernel/softirq.c:695",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53831",
"url": "https://www.suse.com/security/cve/CVE-2023-53831"
},
{
"category": "external",
"summary": "SUSE Bug 1254701 for CVE-2023-53831",
"url": "https://bugzilla.suse.com/1254701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53831"
},
{
"cve": "CVE-2023-53834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53834"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ina2xx: avoid NULL pointer dereference on OF device match\n\nThe affected lines were resulting in a NULL pointer dereference on our\nplatform because the device tree contained the following list of\ncompatible strings:\n\n power-sensor@40 {\n compatible = \"ti,ina232\", \"ti,ina231\";\n ...\n };\n\nSince the driver doesn\u0027t declare a compatible string \"ti,ina232\", the OF\nmatching succeeds on \"ti,ina231\". But the I2C device ID info is\npopulated via the first compatible string, cf. modalias population in\nof_i2c_get_board_info(). Since there is no \"ina232\" entry in the legacy\nI2C device ID table either, the struct i2c_device_id *id pointer in the\nprobe function is NULL.\n\nFix this by using the already populated type variable instead, which\npoints to the proper driver data. Since the name is also wanted, add a\ngeneric one to the ina2xx_config table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53834",
"url": "https://www.suse.com/security/cve/CVE-2023-53834"
},
{
"category": "external",
"summary": "SUSE Bug 1254660 for CVE-2023-53834",
"url": "https://bugzilla.suse.com/1254660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53834"
},
{
"cve": "CVE-2023-53836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53836"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix skb refcnt race after locking changes\n\nThere is a race where skb\u0027s from the sk_psock_backlog can be referenced\nafter userspace side has already skb_consumed() the sk_buff and its refcnt\ndropped to zer0 causing use after free.\n\nThe flow is the following:\n\n while ((skb = skb_peek(\u0026psock-\u003eingress_skb))\n sk_psock_handle_Skb(psock, skb, ..., ingress)\n if (!ingress) ...\n sk_psock_skb_ingress\n sk_psock_skb_ingress_enqueue(skb)\n msg-\u003eskb = skb\n sk_psock_queue_msg(psock, msg)\n skb_dequeue(\u0026psock-\u003eingress_skb)\n\nThe sk_psock_queue_msg() puts the msg on the ingress_msg queue. This is\nwhat the application reads when recvmsg() is called. An application can\nread this anytime after the msg is placed on the queue. The recvmsg hook\nwill also read msg-\u003eskb and then after user space reads the msg will call\nconsume_skb(skb) on it effectively free\u0027ing it.\n\nBut, the race is in above where backlog queue still has a reference to\nthe skb and calls skb_dequeue(). If the skb_dequeue happens after the\nuser reads and free\u0027s the skb we have a use after free.\n\nThe !ingress case does not suffer from this problem because it uses\nsendmsg_*(sk, msg) which does not pass the sk_buff further down the\nstack.\n\nThe following splat was observed with \u0027test_progs -t sockmap_listen\u0027:\n\n [ 1022.710250][ T2556] general protection fault, ...\n [...]\n [ 1022.712830][ T2556] Workqueue: events sk_psock_backlog\n [ 1022.713262][ T2556] RIP: 0010:skb_dequeue+0x4c/0x80\n [ 1022.713653][ T2556] Code: ...\n [...]\n [ 1022.720699][ T2556] Call Trace:\n [ 1022.720984][ T2556] \u003cTASK\u003e\n [ 1022.721254][ T2556] ? die_addr+0x32/0x80^M\n [ 1022.721589][ T2556] ? exc_general_protection+0x25a/0x4b0\n [ 1022.722026][ T2556] ? asm_exc_general_protection+0x22/0x30\n [ 1022.722489][ T2556] ? skb_dequeue+0x4c/0x80\n [ 1022.722854][ T2556] sk_psock_backlog+0x27a/0x300\n [ 1022.723243][ T2556] process_one_work+0x2a7/0x5b0\n [ 1022.723633][ T2556] worker_thread+0x4f/0x3a0\n [ 1022.723998][ T2556] ? __pfx_worker_thread+0x10/0x10\n [ 1022.724386][ T2556] kthread+0xfd/0x130\n [ 1022.724709][ T2556] ? __pfx_kthread+0x10/0x10\n [ 1022.725066][ T2556] ret_from_fork+0x2d/0x50\n [ 1022.725409][ T2556] ? __pfx_kthread+0x10/0x10\n [ 1022.725799][ T2556] ret_from_fork_asm+0x1b/0x30\n [ 1022.726201][ T2556] \u003c/TASK\u003e\n\nTo fix we add an skb_get() before passing the skb to be enqueued in the\nengress queue. This bumps the skb-\u003eusers refcnt so that consume_skb()\nand kfree_skb will not immediately free the sk_buff. With this we can\nbe sure the skb is still around when we do the dequeue. Then we just\nneed to decrement the refcnt or free the skb in the backlog case which\nwe do by calling kfree_skb() on the ingress case as well as the sendmsg\ncase.\n\nBefore locking change from fixes tag we had the sock locked so we\ncouldn\u0027t race with user and there was no issue here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53836",
"url": "https://www.suse.com/security/cve/CVE-2023-53836"
},
{
"category": "external",
"summary": "SUSE Bug 1254693 for CVE-2023-53836",
"url": "https://bugzilla.suse.com/1254693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53836"
},
{
"cve": "CVE-2023-53839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53839"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp: fix data-race around dp-\u003edccps_mss_cache\n\ndccp_sendmsg() reads dp-\u003edccps_mss_cache before locking the socket.\nSame thing in do_dccp_getsockopt().\n\nAdd READ_ONCE()/WRITE_ONCE() annotations,\nand change dccp_sendmsg() to check again dccps_mss_cache\nafter socket is locked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53839",
"url": "https://www.suse.com/security/cve/CVE-2023-53839"
},
{
"category": "external",
"summary": "SUSE Bug 1254655 for CVE-2023-53839",
"url": "https://bugzilla.suse.com/1254655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53839"
},
{
"cve": "CVE-2023-53841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53841"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: report devlink_port_type_warn source device\n\ndevlink_port_type_warn is scheduled for port devlink and warning\nwhen the port type is not set. But from this warning it is not easy\nfound out which device (driver) has no devlink port set.\n\n[ 3709.975552] Type was not set for devlink port.\n[ 3709.975579] WARNING: CPU: 1 PID: 13092 at net/devlink/leftover.c:6775 devlink_port_type_warn+0x11/0x20\n[ 3709.993967] Modules linked in: openvswitch nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nfnetlink bluetooth rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs vhost_net vhost vhost_iotlb tap tun bridge stp llc qrtr intel_rapl_msr intel_rapl_common i10nm_edac nfit libnvdimm x86_pkg_temp_thermal mlx5_ib intel_powerclamp coretemp dell_wmi ledtrig_audio sparse_keymap ipmi_ssif kvm_intel ib_uverbs rfkill ib_core video kvm iTCO_wdt acpi_ipmi intel_vsec irqbypass ipmi_si iTCO_vendor_support dcdbas ipmi_devintf mei_me ipmi_msghandler rapl mei intel_cstate isst_if_mmio isst_if_mbox_pci dell_smbios intel_uncore isst_if_common i2c_i801 dell_wmi_descriptor wmi_bmof i2c_smbus intel_pch_thermal pcspkr acpi_power_meter xfs libcrc32c sd_mod sg nvme_tcp mgag200 i2c_algo_bit nvme_fabrics drm_shmem_helper drm_kms_helper nvme syscopyarea ahci sysfillrect sysimgblt nvme_core fb_sys_fops crct10dif_pclmul libahci mlx5_core sfc crc32_pclmul nvme_common drm\n[ 3709.994030] crc32c_intel mtd t10_pi mlxfw libata tg3 mdio megaraid_sas psample ghash_clmulni_intel pci_hyperv_intf wmi dm_multipath sunrpc dm_mirror dm_region_hash dm_log dm_mod be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi fuse\n[ 3710.108431] CPU: 1 PID: 13092 Comm: kworker/1:1 Kdump: loaded Not tainted 5.14.0-319.el9.x86_64 #1\n[ 3710.108435] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.8.2 09/14/2022\n[ 3710.108437] Workqueue: events devlink_port_type_warn\n[ 3710.108440] RIP: 0010:devlink_port_type_warn+0x11/0x20\n[ 3710.108443] Code: 84 76 fe ff ff 48 c7 03 20 0e 1a ad 31 c0 e9 96 fd ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 48 c7 c7 18 24 4e ad e8 ef 71 62 ff \u003c0f\u003e 0b c3 cc cc cc cc 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f6 87\n[ 3710.108445] RSP: 0018:ff3b6d2e8b3c7e90 EFLAGS: 00010282\n[ 3710.108447] RAX: 0000000000000000 RBX: ff366d6580127080 RCX: 0000000000000027\n[ 3710.108448] RDX: 0000000000000027 RSI: 00000000ffff86de RDI: ff366d753f41f8c8\n[ 3710.108449] RBP: ff366d658ff5a0c0 R08: ff366d753f41f8c0 R09: ff3b6d2e8b3c7e18\n[ 3710.108450] R10: 0000000000000001 R11: 0000000000000023 R12: ff366d753f430600\n[ 3710.108451] R13: ff366d753f436900 R14: 0000000000000000 R15: ff366d753f436905\n[ 3710.108452] FS: 0000000000000000(0000) GS:ff366d753f400000(0000) knlGS:0000000000000000\n[ 3710.108453] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 3710.108454] CR2: 00007f1c57bc74e0 CR3: 000000111d26a001 CR4: 0000000000773ee0\n[ 3710.108456] PKRU: 55555554\n[ 3710.108457] Call Trace:\n[ 3710.108458] \u003cTASK\u003e\n[ 3710.108459] process_one_work+0x1e2/0x3b0\n[ 3710.108466] ? rescuer_thread+0x390/0x390\n[ 3710.108468] worker_thread+0x50/0x3a0\n[ 3710.108471] ? rescuer_thread+0x390/0x390\n[ 3710.108473] kthread+0xdd/0x100\n[ 3710.108477] ? kthread_complete_and_exit+0x20/0x20\n[ 3710.108479] ret_from_fork+0x1f/0x30\n[ 3710.108485] \u003c/TASK\u003e\n[ 3710.108486] ---[ end trace 1b4b23cd0c65d6a0 ]---\n\nAfter patch:\n[ 402.473064] ice 0000:41:00.0: Type was not set for devlink port.\n[ 402.473064] ice 0000:41:00.1: Type was not set for devlink port.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53841",
"url": "https://www.suse.com/security/cve/CVE-2023-53841"
},
{
"category": "external",
"summary": "SUSE Bug 1255009 for CVE-2023-53841",
"url": "https://bugzilla.suse.com/1255009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-53841"
},
{
"cve": "CVE-2023-53842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53842"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove\n\nThe MBHC resources must be released on component probe failure and\nremoval so can not be tied to the lifetime of the component device.\n\nThis is specifically needed to allow probe deferrals of the sound card\nwhich otherwise fails when reprobing the codec component:\n\n snd-sc8280xp sound: ASoC: failed to instantiate card -517\n genirq: Flags mismatch irq 299. 00002001 (mbhc sw intr) vs. 00002001 (mbhc sw intr)\n wcd938x_codec audio-codec: Failed to request mbhc interrupts -16\n wcd938x_codec audio-codec: mbhc initialization failed\n wcd938x_codec audio-codec: ASoC: error at snd_soc_component_probe on audio-codec: -16\n snd-sc8280xp sound: ASoC: failed to instantiate card -16",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53842",
"url": "https://www.suse.com/security/cve/CVE-2023-53842"
},
{
"category": "external",
"summary": "SUSE Bug 1254690 for CVE-2023-53842",
"url": "https://bugzilla.suse.com/1254690"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53842"
},
{
"cve": "CVE-2023-53843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53843"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: reject negative ifindex\n\nRecent changes in net-next (commit 759ab1edb56c (\"net: store netdevs\nin an xarray\")) refactored the handling of pre-assigned ifindexes\nand let syzbot surface a latent problem in ovs. ovs does not validate\nifindex, making it possible to create netdev ports with negative\nifindex values. It\u0027s easy to repro with YNL:\n\n$ ./cli.py --spec netlink/specs/ovs_datapath.yaml \\\n --do new \\\n\t --json \u0027{\"upcall-pid\": 1, \"name\":\"my-dp\"}\u0027\n$ ./cli.py --spec netlink/specs/ovs_vport.yaml \\\n\t --do new \\\n\t --json \u0027{\"upcall-pid\": \"00000001\", \"name\": \"some-port0\", \"dp-ifindex\":3,\"ifindex\":4294901760,\"type\":2}\u0027\n\n$ ip link show\n-65536: some-port0: \u003cBROADCAST,MULTICAST\u003e mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000\n link/ether 7a:48:21:ad:0b:fb brd ff:ff:ff:ff:ff:ff\n...\n\nValidate the inputs. Now the second command correctly returns:\n\n$ ./cli.py --spec netlink/specs/ovs_vport.yaml \\\n\t --do new \\\n\t --json \u0027{\"upcall-pid\": \"00000001\", \"name\": \"some-port0\", \"dp-ifindex\":3,\"ifindex\":4294901760,\"type\":2}\u0027\n\nlib.ynl.NlError: Netlink error: Numerical result out of range\nnl_len = 108 (92) nl_flags = 0x300 nl_type = 2\n\terror: -34\textack: {\u0027msg\u0027: \u0027integer out of range\u0027, \u0027unknown\u0027: [[type:4 len:36] b\u0027\\x0c\\x00\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x0c\\x00\\x03\\x00\\xff\\xff\\xff\\x7f\\x00\\x00\\x00\\x00\\x08\\x00\\x01\\x00\\x08\\x00\\x00\\x00\u0027], \u0027bad-attr\u0027: \u0027.ifindex\u0027}\n\nAccept 0 since it used to be silently ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53843",
"url": "https://www.suse.com/security/cve/CVE-2023-53843"
},
{
"category": "external",
"summary": "SUSE Bug 1254705 for CVE-2023-53843",
"url": "https://bugzilla.suse.com/1254705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53843"
},
{
"cve": "CVE-2023-53844",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53844"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Don\u0027t leak a resource on swapout move error\n\nIf moving the bo to system for swapout failed, we were leaking\na resource. Fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53844",
"url": "https://www.suse.com/security/cve/CVE-2023-53844"
},
{
"category": "external",
"summary": "SUSE Bug 1254649 for CVE-2023-53844",
"url": "https://bugzilla.suse.com/1254649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53844"
},
{
"cve": "CVE-2023-53846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53846"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on direct node in truncate_dnode()\n\nsyzbot reports below bug:\n\nBUG: KASAN: slab-use-after-free in f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574\nRead of size 4 at addr ffff88802a25c000 by task syz-executor148/5000\n\nCPU: 1 PID: 5000 Comm: syz-executor148 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351\n print_report mm/kasan/report.c:462 [inline]\n kasan_report+0x11c/0x130 mm/kasan/report.c:572\n f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574\n truncate_dnode+0x229/0x2e0 fs/f2fs/node.c:944\n f2fs_truncate_inode_blocks+0x64b/0xde0 fs/f2fs/node.c:1154\n f2fs_do_truncate_blocks+0x4ac/0xf30 fs/f2fs/file.c:721\n f2fs_truncate_blocks+0x7b/0x300 fs/f2fs/file.c:749\n f2fs_truncate.part.0+0x4a5/0x630 fs/f2fs/file.c:799\n f2fs_truncate include/linux/fs.h:825 [inline]\n f2fs_setattr+0x1738/0x2090 fs/f2fs/file.c:1006\n notify_change+0xb2c/0x1180 fs/attr.c:483\n do_truncate+0x143/0x200 fs/open.c:66\n handle_truncate fs/namei.c:3295 [inline]\n do_open fs/namei.c:3640 [inline]\n path_openat+0x2083/0x2750 fs/namei.c:3791\n do_filp_open+0x1ba/0x410 fs/namei.c:3818\n do_sys_openat2+0x16d/0x4c0 fs/open.c:1356\n do_sys_open fs/open.c:1372 [inline]\n __do_sys_creat fs/open.c:1448 [inline]\n __se_sys_creat fs/open.c:1442 [inline]\n __x64_sys_creat+0xcd/0x120 fs/open.c:1442\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is, inodeA references inodeB via inodeB\u0027s ino, once inodeA\nis truncated, it calls truncate_dnode() to truncate data blocks in inodeB\u0027s\nnode page, it traverse mapping data from node-\u003ei.i_addr[0] to\nnode-\u003ei.i_addr[ADDRS_PER_BLOCK() - 1], result in out-of-boundary access.\n\nThis patch fixes to add sanity check on dnode page in truncate_dnode(),\nso that, it can help to avoid triggering such issue, and once it encounters\nsuch issue, it will record newly introduced ERROR_INVALID_NODE_REFERENCE\nerror into superblock, later fsck can detect such issue and try repairing.\n\nAlso, it removes f2fs_truncate_data_blocks() for cleanup due to the\nfunction has only one caller, and uses f2fs_truncate_data_blocks_range()\ninstead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53846",
"url": "https://www.suse.com/security/cve/CVE-2023-53846"
},
{
"category": "external",
"summary": "SUSE Bug 1254983 for CVE-2023-53846",
"url": "https://bugzilla.suse.com/1254983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53846"
},
{
"cve": "CVE-2023-53847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53847"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Fix uninit-value in alauda_check_media()\n\nSyzbot got KMSAN to complain about access to an uninitialized value in\nthe alauda subdriver of usb-storage:\n\nBUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0\ndrivers/usb/storage/alauda.c:1137\nCPU: 0 PID: 12279 Comm: usb-storage Not tainted 5.3.0-rc7+ #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x191/0x1f0 lib/dump_stack.c:113\n kmsan_report+0x13a/0x2b0 mm/kmsan/kmsan_report.c:108\n __msan_warning+0x73/0xe0 mm/kmsan/kmsan_instr.c:250\n alauda_check_media+0x344/0x3310 drivers/usb/storage/alauda.c:460\n\nThe problem is that alauda_check_media() doesn\u0027t verify that its USB\ntransfer succeeded before trying to use the received data. What\nshould happen if the transfer fails isn\u0027t entirely clear, but a\nreasonably conservative approach is to pretend that no media is\npresent.\n\nA similar problem exists in a usb_stor_dbg() call in\nalauda_get_media_status(). In this case, when an error occurs the\ncall is redundant, because usb_stor_ctrl_transfer() already will print\na debugging message.\n\nFinally, unrelated to the uninitialized memory access, is the fact\nthat alauda_check_media() performs DMA to a buffer on the stack.\nFortunately usb-storage provides a general purpose DMA-able buffer for\nuses like this. We\u0027ll use it instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53847",
"url": "https://www.suse.com/security/cve/CVE-2023-53847"
},
{
"category": "external",
"summary": "SUSE Bug 1254698 for CVE-2023-53847",
"url": "https://bugzilla.suse.com/1254698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53847"
},
{
"cve": "CVE-2023-53848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53848"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5-cache: fix a deadlock in r5l_exit_log()\n\nCommit b13015af94cf (\"md/raid5-cache: Clear conf-\u003elog after finishing\nwork\") introduce a new problem:\n\n// caller hold reconfig_mutex\nr5l_exit_log\n flush_work(\u0026log-\u003edisable_writeback_work)\n\t\t\tr5c_disable_writeback_async\n\t\t\t wait_event\n\t\t\t /*\n\t\t\t * conf-\u003elog is not NULL, and mddev_trylock()\n\t\t\t * will fail, wait_event() can never pass.\n\t\t\t */\n conf-\u003elog = NULL\n\nFix this problem by setting \u0027config-\u003elog\u0027 to NULL before wake_up() as it\nused to be, so that wait_event() from r5c_disable_writeback_async() can\nexist. In the meantime, move forward md_unregister_thread() so that\nnull-ptr-deref this commit fixed can still be fixed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53848",
"url": "https://www.suse.com/security/cve/CVE-2023-53848"
},
{
"category": "external",
"summary": "SUSE Bug 1254753 for CVE-2023-53848",
"url": "https://bugzilla.suse.com/1254753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53848"
},
{
"cve": "CVE-2023-53850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: use internal state to free traffic IRQs\n\nIf the system tries to close the netdev while iavf_reset_task() is\nrunning, __LINK_STATE_START will be cleared and netif_running() will\nreturn false in iavf_reinit_interrupt_scheme(). This will result in\niavf_free_traffic_irqs() not being called and a leak as follows:\n\n [7632.489326] remove_proc_entry: removing non-empty directory \u0027irq/999\u0027, leaking at least \u0027iavf-enp24s0f0v0-TxRx-0\u0027\n [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0\n\nis shown when pci_disable_msix() is later called. Fix by using the\ninternal adapter state. The traffic IRQs will always exist if\nstate == __IAVF_RUNNING.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53850",
"url": "https://www.suse.com/security/cve/CVE-2023-53850"
},
{
"category": "external",
"summary": "SUSE Bug 1254677 for CVE-2023-53850",
"url": "https://bugzilla.suse.com/1254677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53850"
},
{
"cve": "CVE-2023-53851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53851"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dp: Drop aux devices together with DP controller\n\nUsing devres to depopulate the aux bus made sure that upon a probe\ndeferral the EDP panel device would be destroyed and recreated upon next\nattempt.\n\nBut the struct device which the devres is tied to is the DPUs\n(drm_dev-\u003edev), which may be happen after the DP controller is torn\ndown.\n\nIndications of this can be seen in the commonly seen EDID-hexdump full\nof zeros in the log, or the occasional/rare KASAN fault where the\npanel\u0027s attempt to read the EDID information causes a use after free on\nDP resources.\n\nIt\u0027s tempting to move the devres to the DP controller\u0027s struct device,\nbut the resources used by the device(s) on the aux bus are explicitly\ntorn down in the error path. The KASAN-reported use-after-free also\nremains, as the DP aux \"module\" explicitly frees its devres-allocated\nmemory in this code path.\n\nAs such, explicitly depopulate the aux bus in the error path, and in the\ncomponent unbind path, to avoid these issues.\n\nPatchwork: https://patchwork.freedesktop.org/patch/542163/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53851",
"url": "https://www.suse.com/security/cve/CVE-2023-53851"
},
{
"category": "external",
"summary": "SUSE Bug 1254695 for CVE-2023-53851",
"url": "https://bugzilla.suse.com/1254695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53851"
},
{
"cve": "CVE-2023-53852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53852"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-core: fix memory leak in dhchap_secret_store\n\nFree dhchap_secret in nvme_ctrl_dhchap_secret_store() before we return\nfix following kmemleack:-\n\nunreferenced object 0xffff8886376ea800 (size 64):\n comm \"check\", pid 22048, jiffies 4344316705 (age 92.199s)\n hex dump (first 32 bytes):\n 44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67 DHHC-1:00:nxr5Kg\n 75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c uX4uoAxsJa4c/huL\n backtrace:\n [\u003c0000000030ce5d4b\u003e] __kmalloc+0x4b/0x130\n [\u003c000000009be1cdc1\u003e] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]\n [\u003c00000000ac06c96a\u003e] kernfs_fop_write_iter+0x12b/0x1c0\n [\u003c00000000437e7ced\u003e] vfs_write+0x2ba/0x3c0\n [\u003c00000000f9491baf\u003e] ksys_write+0x5f/0xe0\n [\u003c000000001c46513d\u003e] do_syscall_64+0x3b/0x90\n [\u003c00000000ecf348fe\u003e] entry_SYSCALL_64_after_hwframe+0x72/0xdc\nunreferenced object 0xffff8886376eaf00 (size 64):\n comm \"check\", pid 22048, jiffies 4344316736 (age 92.168s)\n hex dump (first 32 bytes):\n 44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67 DHHC-1:00:nxr5Kg\n 75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c uX4uoAxsJa4c/huL\n backtrace:\n [\u003c0000000030ce5d4b\u003e] __kmalloc+0x4b/0x130\n [\u003c000000009be1cdc1\u003e] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]\n [\u003c00000000ac06c96a\u003e] kernfs_fop_write_iter+0x12b/0x1c0\n [\u003c00000000437e7ced\u003e] vfs_write+0x2ba/0x3c0\n [\u003c00000000f9491baf\u003e] ksys_write+0x5f/0xe0\n [\u003c000000001c46513d\u003e] do_syscall_64+0x3b/0x90\n [\u003c00000000ecf348fe\u003e] entry_SYSCALL_64_after_hwframe+0x72/0xdc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53852",
"url": "https://www.suse.com/security/cve/CVE-2023-53852"
},
{
"category": "external",
"summary": "SUSE Bug 1254653 for CVE-2023-53852",
"url": "https://bugzilla.suse.com/1254653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53852"
},
{
"cve": "CVE-2023-53855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53855"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove\n\nWhen the tagging protocol in current use is \"ocelot-8021q\" and we unbind\nthe driver, we see this splat:\n\n$ echo \u00270000:00:00.2\u0027 \u003e /sys/bus/pci/drivers/fsl_enetc/unbind\nmscc_felix 0000:00:00.5 swp0: left promiscuous mode\nsja1105 spi2.0: Link is Down\nDSA: tree 1 torn down\nmscc_felix 0000:00:00.5 swp2: left promiscuous mode\nsja1105 spi2.2: Link is Down\nDSA: tree 3 torn down\nfsl_enetc 0000:00:00.2 eno2: left promiscuous mode\nmscc_felix 0000:00:00.5: Link is Down\n------------[ cut here ]------------\nRTNL: assertion failed at net/dsa/tag_8021q.c (409)\nWARNING: CPU: 1 PID: 329 at net/dsa/tag_8021q.c:409 dsa_tag_8021q_unregister+0x12c/0x1a0\nModules linked in:\nCPU: 1 PID: 329 Comm: bash Not tainted 6.5.0-rc3+ #771\npc : dsa_tag_8021q_unregister+0x12c/0x1a0\nlr : dsa_tag_8021q_unregister+0x12c/0x1a0\nCall trace:\n dsa_tag_8021q_unregister+0x12c/0x1a0\n felix_tag_8021q_teardown+0x130/0x150\n felix_teardown+0x3c/0xd8\n dsa_tree_teardown_switches+0xbc/0xe0\n dsa_unregister_switch+0x168/0x260\n felix_pci_remove+0x30/0x60\n pci_device_remove+0x4c/0x100\n device_release_driver_internal+0x188/0x288\n device_links_unbind_consumers+0xfc/0x138\n device_release_driver_internal+0xe0/0x288\n device_driver_detach+0x24/0x38\n unbind_store+0xd8/0x108\n drv_attr_store+0x30/0x50\n---[ end trace 0000000000000000 ]---\n------------[ cut here ]------------\nRTNL: assertion failed at net/8021q/vlan_core.c (376)\nWARNING: CPU: 1 PID: 329 at net/8021q/vlan_core.c:376 vlan_vid_del+0x1b8/0x1f0\nCPU: 1 PID: 329 Comm: bash Tainted: G W 6.5.0-rc3+ #771\npc : vlan_vid_del+0x1b8/0x1f0\nlr : vlan_vid_del+0x1b8/0x1f0\n dsa_tag_8021q_unregister+0x8c/0x1a0\n felix_tag_8021q_teardown+0x130/0x150\n felix_teardown+0x3c/0xd8\n dsa_tree_teardown_switches+0xbc/0xe0\n dsa_unregister_switch+0x168/0x260\n felix_pci_remove+0x30/0x60\n pci_device_remove+0x4c/0x100\n device_release_driver_internal+0x188/0x288\n device_links_unbind_consumers+0xfc/0x138\n device_release_driver_internal+0xe0/0x288\n device_driver_detach+0x24/0x38\n unbind_store+0xd8/0x108\n drv_attr_store+0x30/0x50\nDSA: tree 0 torn down\n\nThis was somewhat not so easy to spot, because \"ocelot-8021q\" is not the\ndefault tagging protocol, and thus, not everyone who tests the unbinding\npath may have switched to it beforehand. The default\nfelix_tag_npi_teardown() does not require rtnl_lock() to be held.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53855",
"url": "https://www.suse.com/security/cve/CVE-2023-53855"
},
{
"category": "external",
"summary": "SUSE Bug 1254688 for CVE-2023-53855",
"url": "https://bugzilla.suse.com/1254688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53855"
},
{
"cve": "CVE-2023-53856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53856"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: overlay: Call of_changeset_init() early\n\nWhen of_overlay_fdt_apply() fails, the changeset may be partially\napplied, and the caller is still expected to call of_overlay_remove() to\nclean up this partial state.\n\nHowever, of_overlay_apply() calls of_resolve_phandles() before\ninit_overlay_changeset(). Hence if the overlay fails to apply due to an\nunresolved symbol, the overlay_changeset.cset.entries list is still\nuninitialized, and cleanup will crash with a NULL-pointer dereference in\noverlay_removal_is_ok().\n\nFix this by moving the call to of_changeset_init() from\ninit_overlay_changeset() to of_overlay_fdt_apply(), where all other\nearly initialization is done.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53856",
"url": "https://www.suse.com/security/cve/CVE-2023-53856"
},
{
"category": "external",
"summary": "SUSE Bug 1254661 for CVE-2023-53856",
"url": "https://bugzilla.suse.com/1254661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53856"
},
{
"cve": "CVE-2023-53857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53857"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: bpf_sk_storage: Fix invalid wait context lockdep report\n\n\u0027./test_progs -t test_local_storage\u0027 reported a splat:\n\n[ 27.137569] =============================\n[ 27.138122] [ BUG: Invalid wait context ]\n[ 27.138650] 6.5.0-03980-gd11ae1b16b0a #247 Tainted: G O\n[ 27.139542] -----------------------------\n[ 27.140106] test_progs/1729 is trying to lock:\n[ 27.140713] ffff8883ef047b88 (stock_lock){-.-.}-{3:3}, at: local_lock_acquire+0x9/0x130\n[ 27.141834] other info that might help us debug this:\n[ 27.142437] context-{5:5}\n[ 27.142856] 2 locks held by test_progs/1729:\n[ 27.143352] #0: ffffffff84bcd9c0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x4/0x40\n[ 27.144492] #1: ffff888107deb2c0 (\u0026storage-\u003elock){..-.}-{2:2}, at: bpf_local_storage_update+0x39e/0x8e0\n[ 27.145855] stack backtrace:\n[ 27.146274] CPU: 0 PID: 1729 Comm: test_progs Tainted: G O 6.5.0-03980-gd11ae1b16b0a #247\n[ 27.147550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 27.149127] Call Trace:\n[ 27.149490] \u003cTASK\u003e\n[ 27.149867] dump_stack_lvl+0x130/0x1d0\n[ 27.152609] dump_stack+0x14/0x20\n[ 27.153131] __lock_acquire+0x1657/0x2220\n[ 27.153677] lock_acquire+0x1b8/0x510\n[ 27.157908] local_lock_acquire+0x29/0x130\n[ 27.159048] obj_cgroup_charge+0xf4/0x3c0\n[ 27.160794] slab_pre_alloc_hook+0x28e/0x2b0\n[ 27.161931] __kmem_cache_alloc_node+0x51/0x210\n[ 27.163557] __kmalloc+0xaa/0x210\n[ 27.164593] bpf_map_kzalloc+0xbc/0x170\n[ 27.165147] bpf_selem_alloc+0x130/0x510\n[ 27.166295] bpf_local_storage_update+0x5aa/0x8e0\n[ 27.167042] bpf_fd_sk_storage_update_elem+0xdb/0x1a0\n[ 27.169199] bpf_map_update_value+0x415/0x4f0\n[ 27.169871] map_update_elem+0x413/0x550\n[ 27.170330] __sys_bpf+0x5e9/0x640\n[ 27.174065] __x64_sys_bpf+0x80/0x90\n[ 27.174568] do_syscall_64+0x48/0xa0\n[ 27.175201] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n[ 27.175932] RIP: 0033:0x7effb40e41ad\n[ 27.176357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d8\n[ 27.179028] RSP: 002b:00007ffe64c21fc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141\n[ 27.180088] RAX: ffffffffffffffda RBX: 00007ffe64c22768 RCX: 00007effb40e41ad\n[ 27.181082] RDX: 0000000000000020 RSI: 00007ffe64c22008 RDI: 0000000000000002\n[ 27.182030] RBP: 00007ffe64c21ff0 R08: 0000000000000000 R09: 00007ffe64c22788\n[ 27.183038] R10: 0000000000000064 R11: 0000000000000202 R12: 0000000000000000\n[ 27.184006] R13: 00007ffe64c22788 R14: 00007effb42a1000 R15: 0000000000000000\n[ 27.184958] \u003c/TASK\u003e\n\nIt complains about acquiring a local_lock while holding a raw_spin_lock.\nIt means it should not allocate memory while holding a raw_spin_lock\nsince it is not safe for RT.\n\nraw_spin_lock is needed because bpf_local_storage supports tracing\ncontext. In particular for task local storage, it is easy to\nget a \"current\" task PTR_TO_BTF_ID in tracing bpf prog.\nHowever, task (and cgroup) local storage has already been moved to\nbpf mem allocator which can be used after raw_spin_lock.\n\nThe splat is for the sk storage. For sk (and inode) storage,\nit has not been moved to bpf mem allocator. Using raw_spin_lock or not,\nkzalloc(GFP_ATOMIC) could theoretically be unsafe in tracing context.\nHowever, the local storage helper requires a verifier accepted\nsk pointer (PTR_TO_BTF_ID), it is hypothetical if that (mean running\na bpf prog in a kzalloc unsafe context and also able to hold a verifier\naccepted sk pointer) could happen.\n\nThis patch avoids kzalloc after raw_spin_lock to silent the splat.\nThere is an existing kzalloc before the raw_spin_lock. At that point,\na kzalloc is very likely required because a lookup has just been done\nbefore. Thus, this patch always does the kzalloc before acq\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53857",
"url": "https://www.suse.com/security/cve/CVE-2023-53857"
},
{
"category": "external",
"summary": "SUSE Bug 1254648 for CVE-2023-53857",
"url": "https://bugzilla.suse.com/1254648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53857"
},
{
"cve": "CVE-2023-53858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53858"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error\n\nIf clk_get_rate() fails, the clk that has just been allocated needs to be\nfreed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53858",
"url": "https://www.suse.com/security/cve/CVE-2023-53858"
},
{
"category": "external",
"summary": "SUSE Bug 1254704 for CVE-2023-53858",
"url": "https://bugzilla.suse.com/1254704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53858"
},
{
"cve": "CVE-2023-53860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: don\u0027t attempt to queue IO under RCU protection\n\ndm looks up the table for IO based on the request type, with an\nassumption that if the request is marked REQ_NOWAIT, it\u0027s fine to\nattempt to submit that IO while under RCU read lock protection. This\nis not OK, as REQ_NOWAIT just means that we should not be sleeping\nwaiting on other IO, it does not mean that we can\u0027t potentially\nschedule.\n\nA simple test case demonstrates this quite nicely:\n\nint main(int argc, char *argv[])\n{\n struct iovec iov;\n int fd;\n\n fd = open(\"/dev/dm-0\", O_RDONLY | O_DIRECT);\n posix_memalign(\u0026iov.iov_base, 4096, 4096);\n iov.iov_len = 4096;\n preadv2(fd, \u0026iov, 1, 0, RWF_NOWAIT);\n return 0;\n}\n\nwhich will instantly spew:\n\nBUG: sleeping function called from invalid context at include/linux/sched/mm.h:306\nin_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5580, name: dm-nowait\npreempt_count: 0, expected: 0\nRCU nest depth: 1, expected: 0\nINFO: lockdep is turned off.\nCPU: 7 PID: 5580 Comm: dm-nowait Not tainted 6.6.0-rc1-g39956d2dcd81 #132\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x11d/0x1b0\n __might_resched+0x3c3/0x5e0\n ? preempt_count_sub+0x150/0x150\n mempool_alloc+0x1e2/0x390\n ? mempool_resize+0x7d0/0x7d0\n ? lock_sync+0x190/0x190\n ? lock_release+0x4b7/0x670\n ? internal_get_user_pages_fast+0x868/0x2d40\n bio_alloc_bioset+0x417/0x8c0\n ? bvec_alloc+0x200/0x200\n ? internal_get_user_pages_fast+0xb8c/0x2d40\n bio_alloc_clone+0x53/0x100\n dm_submit_bio+0x27f/0x1a20\n ? lock_release+0x4b7/0x670\n ? blk_try_enter_queue+0x1a0/0x4d0\n ? dm_dax_direct_access+0x260/0x260\n ? rcu_is_watching+0x12/0xb0\n ? blk_try_enter_queue+0x1cc/0x4d0\n __submit_bio+0x239/0x310\n ? __bio_queue_enter+0x700/0x700\n ? kvm_clock_get_cycles+0x40/0x60\n ? ktime_get+0x285/0x470\n submit_bio_noacct_nocheck+0x4d9/0xb80\n ? should_fail_request+0x80/0x80\n ? preempt_count_sub+0x150/0x150\n ? lock_release+0x4b7/0x670\n ? __bio_add_page+0x143/0x2d0\n ? iov_iter_revert+0x27/0x360\n submit_bio_noacct+0x53e/0x1b30\n submit_bio_wait+0x10a/0x230\n ? submit_bio_wait_endio+0x40/0x40\n __blkdev_direct_IO_simple+0x4f8/0x780\n ? blkdev_bio_end_io+0x4c0/0x4c0\n ? stack_trace_save+0x90/0xc0\n ? __bio_clone+0x3c0/0x3c0\n ? lock_release+0x4b7/0x670\n ? lock_sync+0x190/0x190\n ? atime_needs_update+0x3bf/0x7e0\n ? timestamp_truncate+0x21b/0x2d0\n ? inode_owner_or_capable+0x240/0x240\n blkdev_direct_IO.part.0+0x84a/0x1810\n ? rcu_is_watching+0x12/0xb0\n ? lock_release+0x4b7/0x670\n ? blkdev_read_iter+0x40d/0x530\n ? reacquire_held_locks+0x4e0/0x4e0\n ? __blkdev_direct_IO_simple+0x780/0x780\n ? rcu_is_watching+0x12/0xb0\n ? __mark_inode_dirty+0x297/0xd50\n ? preempt_count_add+0x72/0x140\n blkdev_read_iter+0x2a4/0x530\n do_iter_readv_writev+0x2f2/0x3c0\n ? generic_copy_file_range+0x1d0/0x1d0\n ? fsnotify_perm.part.0+0x25d/0x630\n ? security_file_permission+0xd8/0x100\n do_iter_read+0x31b/0x880\n ? import_iovec+0x10b/0x140\n vfs_readv+0x12d/0x1a0\n ? vfs_iter_read+0xb0/0xb0\n ? rcu_is_watching+0x12/0xb0\n ? rcu_is_watching+0x12/0xb0\n ? lock_release+0x4b7/0x670\n do_preadv+0x1b3/0x260\n ? do_readv+0x370/0x370\n __x64_sys_preadv2+0xef/0x150\n do_syscall_64+0x39/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7f5af41ad806\nCode: 41 54 41 89 fc 55 44 89 c5 53 48 89 cb 48 83 ec 18 80 3d e4 dd 0d 00 00 74 7a 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 0f 87 be 00 00 00 48 85 c0 79 4a 48 8b 0d da 55\nRSP: 002b:00007ffd3145c7f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000147\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5af41ad806\nRDX: 0000000000000001 RSI: 00007ffd3145c850 RDI: 0000000000000003\nRBP: 0000000000000008 R08: 0000000000000000 R09: 0000000000000008\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003\nR13: 00007ffd3145c850 R14: 000055f5f0431dd8 R15: 0000000000000001\n \u003c/TASK\u003e\n\nwhere in fact it is\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53860",
"url": "https://www.suse.com/security/cve/CVE-2023-53860"
},
{
"category": "external",
"summary": "SUSE Bug 1254626 for CVE-2023-53860",
"url": "https://bugzilla.suse.com/1254626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53860"
},
{
"cve": "CVE-2023-53861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: correct grp validation in ext4_mb_good_group\n\nGroup corruption check will access memory of grp and will trigger kernel\ncrash if grp is NULL. So do NULL check before corruption check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53861",
"url": "https://www.suse.com/security/cve/CVE-2023-53861"
},
{
"category": "external",
"summary": "SUSE Bug 1254678 for CVE-2023-53861",
"url": "https://bugzilla.suse.com/1254678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53861"
},
{
"cve": "CVE-2023-53863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: do not hard code device address lenth in fdb dumps\n\nsyzbot reports that some netdev devices do not have a six bytes\naddress [1]\n\nReplace ETH_ALEN by dev-\u003eaddr_len.\n\n[1] (Case of a device where dev-\u003eaddr_len = 4)\n\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in copyout+0xb8/0x100 lib/iov_iter.c:169\ninstrument_copy_to_user include/linux/instrumented.h:114 [inline]\ncopyout+0xb8/0x100 lib/iov_iter.c:169\n_copy_to_iter+0x6d8/0x1d00 lib/iov_iter.c:536\ncopy_to_iter include/linux/uio.h:206 [inline]\nsimple_copy_to_iter+0x68/0xa0 net/core/datagram.c:513\n__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419\nskb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:527\nskb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]\nnetlink_recvmsg+0x4ae/0x15a0 net/netlink/af_netlink.c:1970\nsock_recvmsg_nosec net/socket.c:1019 [inline]\nsock_recvmsg net/socket.c:1040 [inline]\n____sys_recvmsg+0x283/0x7f0 net/socket.c:2722\n___sys_recvmsg+0x223/0x840 net/socket.c:2764\ndo_recvmmsg+0x4f9/0xfd0 net/socket.c:2858\n__sys_recvmmsg net/socket.c:2937 [inline]\n__do_sys_recvmmsg net/socket.c:2960 [inline]\n__se_sys_recvmmsg net/socket.c:2953 [inline]\n__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was stored to memory at:\n__nla_put lib/nlattr.c:1009 [inline]\nnla_put+0x1c6/0x230 lib/nlattr.c:1067\nnlmsg_populate_fdb_fill+0x2b8/0x600 net/core/rtnetlink.c:4071\nnlmsg_populate_fdb net/core/rtnetlink.c:4418 [inline]\nndo_dflt_fdb_dump+0x616/0x840 net/core/rtnetlink.c:4456\nrtnl_fdb_dump+0x14ff/0x1fc0 net/core/rtnetlink.c:4629\nnetlink_dump+0x9d1/0x1310 net/netlink/af_netlink.c:2268\nnetlink_recvmsg+0xc5c/0x15a0 net/netlink/af_netlink.c:1995\nsock_recvmsg_nosec+0x7a/0x120 net/socket.c:1019\n____sys_recvmsg+0x664/0x7f0 net/socket.c:2720\n___sys_recvmsg+0x223/0x840 net/socket.c:2764\ndo_recvmmsg+0x4f9/0xfd0 net/socket.c:2858\n__sys_recvmmsg net/socket.c:2937 [inline]\n__do_sys_recvmmsg net/socket.c:2960 [inline]\n__se_sys_recvmmsg net/socket.c:2953 [inline]\n__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\nslab_post_alloc_hook+0x12d/0xb60 mm/slab.h:716\nslab_alloc_node mm/slub.c:3451 [inline]\n__kmem_cache_alloc_node+0x4ff/0x8b0 mm/slub.c:3490\nkmalloc_trace+0x51/0x200 mm/slab_common.c:1057\nkmalloc include/linux/slab.h:559 [inline]\n__hw_addr_create net/core/dev_addr_lists.c:60 [inline]\n__hw_addr_add_ex+0x2e5/0x9e0 net/core/dev_addr_lists.c:118\n__dev_mc_add net/core/dev_addr_lists.c:867 [inline]\ndev_mc_add+0x9a/0x130 net/core/dev_addr_lists.c:885\nigmp6_group_added+0x267/0xbc0 net/ipv6/mcast.c:680\nipv6_mc_up+0x296/0x3b0 net/ipv6/mcast.c:2754\nipv6_mc_remap+0x1e/0x30 net/ipv6/mcast.c:2708\naddrconf_type_change net/ipv6/addrconf.c:3731 [inline]\naddrconf_notify+0x4d3/0x1d90 net/ipv6/addrconf.c:3699\nnotifier_call_chain kernel/notifier.c:93 [inline]\nraw_notifier_call_chain+0xe4/0x430 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1935 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:1973 [inline]\ncall_netdevice_notifiers+0x1ee/0x2d0 net/core/dev.c:1987\nbond_enslave+0xccd/0x53f0 drivers/net/bonding/bond_main.c:1906\ndo_set_master net/core/rtnetlink.c:2626 [inline]\nrtnl_newlink_create net/core/rtnetlink.c:3460 [inline]\n__rtnl_newlink net/core/rtnetlink.c:3660 [inline]\nrtnl_newlink+0x378c/0x40e0 net/core/rtnetlink.c:3673\nrtnetlink_rcv_msg+0x16a6/0x1840 net/core/rtnetlink.c:6395\nnetlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2546\nrtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6413\nnetlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]\nnetlink_unicast+0xf28/0x1230 net/netlink/af_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53863",
"url": "https://www.suse.com/security/cve/CVE-2023-53863"
},
{
"category": "external",
"summary": "SUSE Bug 1254657 for CVE-2023-53863",
"url": "https://bugzilla.suse.com/1254657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53863"
},
{
"cve": "CVE-2023-53864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()\n\nWhen disabling overlay plane in mxsfb_plane_overlay_atomic_update(),\noverlay plane\u0027s framebuffer pointer is NULL. So, dereferencing it would\ncause a kernel Oops(NULL pointer dereferencing). Fix the issue by\ndisabling overlay plane in mxsfb_plane_overlay_atomic_disable() instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53864",
"url": "https://www.suse.com/security/cve/CVE-2023-53864"
},
{
"category": "external",
"summary": "SUSE Bug 1254754 for CVE-2023-53864",
"url": "https://bugzilla.suse.com/1254754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53864"
},
{
"cve": "CVE-2023-53865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix warning when putting transaction with qgroups enabled after abort\n\nIf we have a transaction abort with qgroups enabled we get a warning\ntriggered when doing the final put on the transaction, like this:\n\n [552.6789] ------------[ cut here ]------------\n [552.6815] WARNING: CPU: 4 PID: 81745 at fs/btrfs/transaction.c:144 btrfs_put_transaction+0x123/0x130 [btrfs]\n [552.6817] Modules linked in: btrfs blake2b_generic xor (...)\n [552.6819] CPU: 4 PID: 81745 Comm: btrfs-transacti Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [552.6819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n [552.6819] RIP: 0010:btrfs_put_transaction+0x123/0x130 [btrfs]\n [552.6821] Code: bd a0 01 00 (...)\n [552.6821] RSP: 0018:ffffa168c0527e28 EFLAGS: 00010286\n [552.6821] RAX: ffff936042caed00 RBX: ffff93604a3eb448 RCX: 0000000000000000\n [552.6821] RDX: ffff93606421b028 RSI: ffffffff92ff0878 RDI: ffff93606421b010\n [552.6821] RBP: ffff93606421b000 R08: 0000000000000000 R09: ffffa168c0d07c20\n [552.6821] R10: 0000000000000000 R11: ffff93608dc52950 R12: ffffa168c0527e70\n [552.6821] R13: ffff93606421b000 R14: ffff93604a3eb420 R15: ffff93606421b028\n [552.6821] FS: 0000000000000000(0000) GS:ffff93675fb00000(0000) knlGS:0000000000000000\n [552.6821] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [552.6821] CR2: 0000558ad262b000 CR3: 000000014feda005 CR4: 0000000000370ee0\n [552.6822] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [552.6822] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [552.6822] Call Trace:\n [552.6822] \u003cTASK\u003e\n [552.6822] ? __warn+0x80/0x130\n [552.6822] ? btrfs_put_transaction+0x123/0x130 [btrfs]\n [552.6824] ? report_bug+0x1f4/0x200\n [552.6824] ? handle_bug+0x42/0x70\n [552.6824] ? exc_invalid_op+0x14/0x70\n [552.6824] ? asm_exc_invalid_op+0x16/0x20\n [552.6824] ? btrfs_put_transaction+0x123/0x130 [btrfs]\n [552.6826] btrfs_cleanup_transaction+0xe7/0x5e0 [btrfs]\n [552.6828] ? _raw_spin_unlock_irqrestore+0x23/0x40\n [552.6828] ? try_to_wake_up+0x94/0x5e0\n [552.6828] ? __pfx_process_timeout+0x10/0x10\n [552.6828] transaction_kthread+0x103/0x1d0 [btrfs]\n [552.6830] ? __pfx_transaction_kthread+0x10/0x10 [btrfs]\n [552.6832] kthread+0xee/0x120\n [552.6832] ? __pfx_kthread+0x10/0x10\n [552.6832] ret_from_fork+0x29/0x50\n [552.6832] \u003c/TASK\u003e\n [552.6832] ---[ end trace 0000000000000000 ]---\n\nThis corresponds to this line of code:\n\n void btrfs_put_transaction(struct btrfs_transaction *transaction)\n {\n (...)\n WARN_ON(!RB_EMPTY_ROOT(\n \u0026transaction-\u003edelayed_refs.dirty_extent_root));\n (...)\n }\n\nThe warning happens because btrfs_qgroup_destroy_extent_records(), called\nin the transaction abort path, we free all entries from the rbtree\n\"dirty_extent_root\" with rbtree_postorder_for_each_entry_safe(), but we\ndon\u0027t actually empty the rbtree - it\u0027s still pointing to nodes that were\nfreed.\n\nSo set the rbtree\u0027s root node to NULL to avoid this warning (assign\nRB_ROOT).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53865",
"url": "https://www.suse.com/security/cve/CVE-2023-53865"
},
{
"category": "external",
"summary": "SUSE Bug 1254762 for CVE-2023-53865",
"url": "https://bugzilla.suse.com/1254762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53865"
},
{
"cve": "CVE-2023-53989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53989"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: mm: fix VA-range sanity check\n\nBoth create_mapping_noalloc() and update_mapping_prot() sanity-check\ntheir \u0027virt\u0027 parameter, but the check itself doesn\u0027t make much sense.\nThe condition used today appears to be a historical accident.\n\nThe sanity-check condition:\n\n\tif ((virt \u003e= PAGE_END) \u0026\u0026 (virt \u003c VMALLOC_START)) {\n\t\t[ ... warning here ... ]\n\t\treturn;\n\t}\n\n... can only be true for the KASAN shadow region or the module region,\nand there\u0027s no reason to exclude these specifically for creating and\nupdateing mappings.\n\nWhen arm64 support was first upstreamed in commit:\n\n c1cc1552616d0f35 (\"arm64: MMU initialisation\")\n\n... the condition was:\n\n\tif (virt \u003c VMALLOC_START) {\n\t\t[ ... warning here ... ]\n\t\treturn;\n\t}\n\nAt the time, VMALLOC_START was the lowest kernel address, and this was\nchecking whether \u0027virt\u0027 would be translated via TTBR1.\n\nSubsequently in commit:\n\n 14c127c957c1c607 (\"arm64: mm: Flip kernel VA space\")\n\n... the condition was changed to:\n\n\tif ((virt \u003e= VA_START) \u0026\u0026 (virt \u003c VMALLOC_START)) {\n\t\t[ ... warning here ... ]\n\t\treturn;\n\t}\n\nThis appear to have been a thinko. The commit moved the linear map to\nthe bottom of the kernel address space, with VMALLOC_START being at the\nhalfway point. The old condition would warn for changes to the linear\nmap below this, and at the time VA_START was the end of the linear map.\n\nSubsequently we cleaned up the naming of VA_START in commit:\n\n 77ad4ce69321abbe (\"arm64: memory: rename VA_START to PAGE_END\")\n\n... keeping the erroneous condition as:\n\n\tif ((virt \u003e= PAGE_END) \u0026\u0026 (virt \u003c VMALLOC_START)) {\n\t\t[ ... warning here ... ]\n\t\treturn;\n\t}\n\nCorrect the condition to check against the start of the TTBR1 address\nspace, which is currently PAGE_OFFSET. This simplifies the logic, and\nmore clearly matches the \"outside kernel range\" message in the warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53989",
"url": "https://www.suse.com/security/cve/CVE-2023-53989"
},
{
"category": "external",
"summary": "SUSE Bug 1256302 for CVE-2023-53989",
"url": "https://bugzilla.suse.com/1256302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53989"
},
{
"cve": "CVE-2023-53992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53992"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: ocb: don\u0027t leave if not joined\n\nIf there\u0027s no OCB state, don\u0027t ask the driver/mac80211 to\nleave, since that\u0027s just confusing. Since set/clear the\nchandef state, that\u0027s a simple check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53992",
"url": "https://www.suse.com/security/cve/CVE-2023-53992"
},
{
"category": "external",
"summary": "SUSE Bug 1256058 for CVE-2023-53992",
"url": "https://bugzilla.suse.com/1256058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53992"
},
{
"cve": "CVE-2023-53994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53994"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: remove WARN_ON to prevent panic_on_warn\n\nRemove unnecessary early code development check and the WARN_ON\nthat it uses. The irq alloc and free paths have long been\ncleaned up and this check shouldn\u0027t have stuck around so long.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53994",
"url": "https://www.suse.com/security/cve/CVE-2023-53994"
},
{
"category": "external",
"summary": "SUSE Bug 1255570 for CVE-2023-53994",
"url": "https://bugzilla.suse.com/1255570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53994"
},
{
"cve": "CVE-2023-53995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix one memleak in __inet_del_ifa()\n\nI got the below warning when do fuzzing test:\nunregister_netdevice: waiting for bond0 to become free. Usage count = 2\n\nIt can be repoduced via:\n\nip link add bond0 type bond\nsysctl -w net.ipv4.conf.bond0.promote_secondaries=1\nip addr add 4.117.174.103/0 scope 0x40 dev bond0\nip addr add 192.168.100.111/255.255.255.254 scope 0 dev bond0\nip addr add 0.0.0.4/0 scope 0x40 secondary dev bond0\nip addr del 4.117.174.103/0 scope 0x40 dev bond0\nip link delete bond0 type bond\n\nIn this reproduction test case, an incorrect \u0027last_prim\u0027 is found in\n__inet_del_ifa(), as a result, the secondary address(0.0.0.4/0 scope 0x40)\nis lost. The memory of the secondary address is leaked and the reference of\nin_device and net_device is leaked.\n\nFix this problem:\nLook for \u0027last_prim\u0027 starting at location of the deleted IP and inserting\nthe promoted IP into the location of \u0027last_prim\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53995",
"url": "https://www.suse.com/security/cve/CVE-2023-53995"
},
{
"category": "external",
"summary": "SUSE Bug 1255616 for CVE-2023-53995",
"url": "https://bugzilla.suse.com/1255616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53995"
},
{
"cve": "CVE-2023-53996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sev: Make enc_dec_hypercall() accept a size instead of npages\n\nenc_dec_hypercall() accepted a page count instead of a size, which\nforced its callers to round up. As a result, non-page aligned\nvaddrs caused pages to be spuriously marked as decrypted via the\nencryption status hypercall, which in turn caused consistent\ncorruption of pages during live migration. Live migration requires\naccurate encryption status information to avoid migrating pages\nfrom the wrong perspective.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53996",
"url": "https://www.suse.com/security/cve/CVE-2023-53996"
},
{
"category": "external",
"summary": "SUSE Bug 1255618 for CVE-2023-53996",
"url": "https://bugzilla.suse.com/1255618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53996"
},
{
"cve": "CVE-2023-53997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: of: fix double-free on unregistration\n\nSince commit 3d439b1a2ad3 (\"thermal/core: Alloc-copy-free the thermal\nzone parameters structure\"), thermal_zone_device_register() allocates\na copy of the tzp argument and frees it when unregistering, so\nthermal_of_zone_register() now ends up leaking its original tzp and\ndouble-freeing the tzp copy. Fix this by locating tzp on stack instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53997",
"url": "https://www.suse.com/security/cve/CVE-2023-53997"
},
{
"category": "external",
"summary": "SUSE Bug 1255632 for CVE-2023-53997",
"url": "https://bugzilla.suse.com/1255632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53997"
},
{
"cve": "CVE-2023-53998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: virtio - Fix race on data_avail and actual data\n\nThe virtio rng device kicks off a new entropy request whenever the\ndata available reaches zero. When a new request occurs at the end\nof a read operation, that is, when the result of that request is\nonly needed by the next reader, then there is a race between the\nwriting of the new data and the next reader.\n\nThis is because there is no synchronisation whatsoever between the\nwriter and the reader.\n\nFix this by writing data_avail with smp_store_release and reading\nit with smp_load_acquire when we first enter read. The subsequent\nreads are safe because they\u0027re either protected by the first load\nacquire, or by the completion mechanism.\n\nAlso remove the redundant zeroing of data_idx in random_recv_done\n(data_idx must already be zero at this point) and data_avail in\nrequest_entropy (ditto).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53998",
"url": "https://www.suse.com/security/cve/CVE-2023-53998"
},
{
"category": "external",
"summary": "SUSE Bug 1255578 for CVE-2023-53998",
"url": "https://bugzilla.suse.com/1255578"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53998"
},
{
"cve": "CVE-2023-53999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, Fix internal port memory leak\n\nThe flow rule can be splited, and the extra post_act rules are added\nto post_act table. It\u0027s possible to trigger memleak when the rule\nforwards packets from internal port and over tunnel, in the case that,\nfor example, CT \u0027new\u0027 state offload is allowed. As int_port object is\nassigned to the flow attribute of post_act rule, and its refcnt is\nincremented by mlx5e_tc_int_port_get(), but mlx5e_tc_int_port_put() is\nnot called, the refcnt is never decremented, then int_port is never\nfreed.\n\nThe kmemleak reports the following error:\nunreferenced object 0xffff888128204b80 (size 64):\n comm \"handler20\", pid 50121, jiffies 4296973009 (age 642.932s)\n hex dump (first 32 bytes):\n 01 00 00 00 19 00 00 00 03 f0 00 00 04 00 00 00 ................\n 98 77 67 41 81 88 ff ff 98 77 67 41 81 88 ff ff .wgA.....wgA....\n backtrace:\n [\u003c00000000e992680d\u003e] kmalloc_trace+0x27/0x120\n [\u003c000000009e945a98\u003e] mlx5e_tc_int_port_get+0x3f3/0xe20 [mlx5_core]\n [\u003c0000000035a537f0\u003e] mlx5e_tc_add_fdb_flow+0x473/0xcf0 [mlx5_core]\n [\u003c0000000070c2cec6\u003e] __mlx5e_add_fdb_flow+0x7cf/0xe90 [mlx5_core]\n [\u003c000000005cc84048\u003e] mlx5e_configure_flower+0xd40/0x4c40 [mlx5_core]\n [\u003c000000004f8a2031\u003e] mlx5e_rep_indr_offload.isra.0+0x10e/0x1c0 [mlx5_core]\n [\u003c000000007df797dc\u003e] mlx5e_rep_indr_setup_tc_cb+0x90/0x130 [mlx5_core]\n [\u003c0000000016c15cc3\u003e] tc_setup_cb_add+0x1cf/0x410\n [\u003c00000000a63305b4\u003e] fl_hw_replace_filter+0x38f/0x670 [cls_flower]\n [\u003c000000008bc9e77c\u003e] fl_change+0x1fd5/0x4430 [cls_flower]\n [\u003c00000000e7f766e4\u003e] tc_new_tfilter+0x867/0x2010\n [\u003c00000000e101c0ef\u003e] rtnetlink_rcv_msg+0x6fc/0x9f0\n [\u003c00000000e1111d44\u003e] netlink_rcv_skb+0x12c/0x360\n [\u003c0000000082dd6c8b\u003e] netlink_unicast+0x438/0x710\n [\u003c00000000fc568f70\u003e] netlink_sendmsg+0x794/0xc50\n [\u003c0000000016e92590\u003e] sock_sendmsg+0xc5/0x190\n\nSo fix this by moving int_port cleanup code to the flow attribute\nfree helper, which is used by all the attribute free cases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53999",
"url": "https://www.suse.com/security/cve/CVE-2023-53999"
},
{
"category": "external",
"summary": "SUSE Bug 1255621 for CVE-2023-53999",
"url": "https://bugzilla.suse.com/1255621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-53999"
},
{
"cve": "CVE-2023-54000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54000"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix deadlock issue when externel_lb and reset are executed together\n\nWhen externel_lb and reset are executed together, a deadlock may\noccur:\n[ 3147.217009] INFO: task kworker/u321:0:7 blocked for more than 120 seconds.\n[ 3147.230483] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 3147.238999] task:kworker/u321:0 state:D stack: 0 pid: 7 ppid: 2 flags:0x00000008\n[ 3147.248045] Workqueue: hclge hclge_service_task [hclge]\n[ 3147.253957] Call trace:\n[ 3147.257093] __switch_to+0x7c/0xbc\n[ 3147.261183] __schedule+0x338/0x6f0\n[ 3147.265357] schedule+0x50/0xe0\n[ 3147.269185] schedule_preempt_disabled+0x18/0x24\n[ 3147.274488] __mutex_lock.constprop.0+0x1d4/0x5dc\n[ 3147.279880] __mutex_lock_slowpath+0x1c/0x30\n[ 3147.284839] mutex_lock+0x50/0x60\n[ 3147.288841] rtnl_lock+0x20/0x2c\n[ 3147.292759] hclge_reset_prepare+0x68/0x90 [hclge]\n[ 3147.298239] hclge_reset_subtask+0x88/0xe0 [hclge]\n[ 3147.303718] hclge_reset_service_task+0x84/0x120 [hclge]\n[ 3147.309718] hclge_service_task+0x2c/0x70 [hclge]\n[ 3147.315109] process_one_work+0x1d0/0x490\n[ 3147.319805] worker_thread+0x158/0x3d0\n[ 3147.324240] kthread+0x108/0x13c\n[ 3147.328154] ret_from_fork+0x10/0x18\n\nIn externel_lb process, the hns3 driver call napi_disable()\nfirst, then the reset happen, then the restore process of the\nexternel_lb will fail, and will not call napi_enable(). When\ndoing externel_lb again, napi_disable() will be double call,\ncause a deadlock of rtnl_lock().\n\nThis patch use the HNS3_NIC_STATE_DOWN state to protect the\ncalling of napi_disable() and napi_enable() in externel_lb\nprocess, just as the usage in ndo_stop() and ndo_start().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54000",
"url": "https://www.suse.com/security/cve/CVE-2023-54000"
},
{
"category": "external",
"summary": "SUSE Bug 1255564 for CVE-2023-54000",
"url": "https://bugzilla.suse.com/1255564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54000"
},
{
"cve": "CVE-2023-54001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: r8712: Fix memory leak in _r8712_init_xmit_priv()\n\nIn the above mentioned routine, memory is allocated in several places.\nIf the first succeeds and a later one fails, the routine will leak memory.\nThis patch fixes commit 2865d42c78a9 (\"staging: r8712u: Add the new driver\nto the mainline kernel\"). A potential memory leak in\nr8712_xmit_resource_alloc() is also addressed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54001",
"url": "https://www.suse.com/security/cve/CVE-2023-54001"
},
{
"category": "external",
"summary": "SUSE Bug 1255628 for CVE-2023-54001",
"url": "https://bugzilla.suse.com/1255628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54001"
},
{
"cve": "CVE-2023-54005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54005"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix memory leak in binder_init()\n\nIn binder_init(), the destruction of binder_alloc_shrinker_init() is not\nperformed in the wrong path, which will cause memory leaks. So this commit\nintroduces binder_alloc_shrinker_exit() and calls it in the wrong path to\nfix that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54005",
"url": "https://www.suse.com/security/cve/CVE-2023-54005"
},
{
"category": "external",
"summary": "SUSE Bug 1255629 for CVE-2023-54005",
"url": "https://bugzilla.suse.com/1255629"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54005"
},
{
"cve": "CVE-2023-54006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data-race around unix_tot_inflight.\n\nunix_tot_inflight is changed under spin_lock(unix_gc_lock), but\nunix_release_sock() reads it locklessly.\n\nLet\u0027s use READ_ONCE() for unix_tot_inflight.\n\nNote that the writer side was marked by commit 9d6d7f1cb67c (\"af_unix:\nannote lockless accesses to unix_tot_inflight \u0026 gc_in_progress\")\n\nBUG: KCSAN: data-race in unix_inflight / unix_release_sock\n\nwrite (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:\n unix_inflight+0x130/0x180 net/unix/scm.c:64\n unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123\n unix_scm_to_skb net/unix/af_unix.c:1832 [inline]\n unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg+0x148/0x160 net/socket.c:747\n ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493\n ___sys_sendmsg+0xc6/0x140 net/socket.c:2547\n __sys_sendmsg+0x94/0x140 net/socket.c:2576\n __do_sys_sendmsg net/socket.c:2585 [inline]\n __se_sys_sendmsg net/socket.c:2583 [inline]\n __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:\n unix_release_sock+0x608/0x910 net/unix/af_unix.c:671\n unix_release+0x59/0x80 net/unix/af_unix.c:1058\n __sock_release+0x7d/0x170 net/socket.c:653\n sock_close+0x19/0x30 net/socket.c:1385\n __fput+0x179/0x5e0 fs/file_table.c:321\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0x00000000 -\u003e 0x00000001\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54006",
"url": "https://www.suse.com/security/cve/CVE-2023-54006"
},
{
"category": "external",
"summary": "SUSE Bug 1255591 for CVE-2023-54006",
"url": "https://bugzilla.suse.com/1255591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54006"
},
{
"cve": "CVE-2023-54008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54008"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_vdpa: build affinity masks conditionally\n\nWe try to build affinity mask via create_affinity_masks()\nunconditionally which may lead several issues:\n\n- the affinity mask is not used for parent without affinity support\n (only VDUSE support the affinity now)\n- the logic of create_affinity_masks() might not work for devices\n other than block. For example it\u0027s not rare in the networking device\n where the number of queues could exceed the number of CPUs. Such\n case breaks the current affinity logic which is based on\n group_cpus_evenly() who assumes the number of CPUs are not less than\n the number of groups. This can trigger a warning[1]:\n\n\tif (ret \u003e= 0)\n\t\tWARN_ON(nr_present + nr_others \u003c numgrps);\n\nFixing this by only build the affinity masks only when\n\n- Driver passes affinity descriptor, driver like virtio-blk can make\n sure to limit the number of queues when it exceeds the number of CPUs\n- Parent support affinity setting config ops\n\nThis help to avoid the warning. More optimizations could be done on\ntop.\n\n[1]\n[ 682.146655] WARNING: CPU: 6 PID: 1550 at lib/group_cpus.c:400 group_cpus_evenly+0x1aa/0x1c0\n[ 682.146668] CPU: 6 PID: 1550 Comm: vdpa Not tainted 6.5.0-rc5jason+ #79\n[ 682.146671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n[ 682.146673] RIP: 0010:group_cpus_evenly+0x1aa/0x1c0\n[ 682.146676] Code: 4c 89 e0 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc e8 1b c4 74 ff 48 89 ef e8 13 ac 98 ff 4c 89 e7 45 31 e4 e8 08 ac 98 ff eb c2 \u003c0f\u003e 0b eb b6 e8 fd 05 c3 00 45 31 e4 eb e5 cc cc cc cc cc cc cc cc\n[ 682.146679] RSP: 0018:ffffc9000215f498 EFLAGS: 00010293\n[ 682.146682] RAX: 000000000001f1e0 RBX: 0000000000000041 RCX: 0000000000000000\n[ 682.146684] RDX: ffff888109922058 RSI: 0000000000000041 RDI: 0000000000000030\n[ 682.146686] RBP: ffff888109922058 R08: ffffc9000215f498 R09: ffffc9000215f4a0\n[ 682.146687] R10: 00000000000198d0 R11: 0000000000000030 R12: ffff888107e02800\n[ 682.146689] R13: 0000000000000030 R14: 0000000000000030 R15: 0000000000000041\n[ 682.146692] FS: 00007fef52315740(0000) GS:ffff888237380000(0000) knlGS:0000000000000000\n[ 682.146695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 682.146696] CR2: 00007fef52509000 CR3: 0000000110dbc004 CR4: 0000000000370ee0\n[ 682.146698] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 682.146700] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 682.146701] Call Trace:\n[ 682.146703] \u003cTASK\u003e\n[ 682.146705] ? __warn+0x7b/0x130\n[ 682.146709] ? group_cpus_evenly+0x1aa/0x1c0\n[ 682.146712] ? report_bug+0x1c8/0x1e0\n[ 682.146717] ? handle_bug+0x3c/0x70\n[ 682.146721] ? exc_invalid_op+0x14/0x70\n[ 682.146723] ? asm_exc_invalid_op+0x16/0x20\n[ 682.146727] ? group_cpus_evenly+0x1aa/0x1c0\n[ 682.146729] ? group_cpus_evenly+0x15c/0x1c0\n[ 682.146731] create_affinity_masks+0xaf/0x1a0\n[ 682.146735] virtio_vdpa_find_vqs+0x83/0x1d0\n[ 682.146738] ? __pfx_default_calc_sets+0x10/0x10\n[ 682.146742] virtnet_find_vqs+0x1f0/0x370\n[ 682.146747] virtnet_probe+0x501/0xcd0\n[ 682.146749] ? vp_modern_get_status+0x12/0x20\n[ 682.146751] ? get_cap_addr.isra.0+0x10/0xc0\n[ 682.146754] virtio_dev_probe+0x1af/0x260\n[ 682.146759] really_probe+0x1a5/0x410",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54008",
"url": "https://www.suse.com/security/cve/CVE-2023-54008"
},
{
"category": "external",
"summary": "SUSE Bug 1255630 for CVE-2023-54008",
"url": "https://bugzilla.suse.com/1255630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54008"
},
{
"cve": "CVE-2023-54014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()\n\nKlocwork reported warning of rport maybe NULL and will be dereferenced.\nrport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.\n\nCheck valid rport returned by fc_bsg_to_rport().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54014",
"url": "https://www.suse.com/security/cve/CVE-2023-54014"
},
{
"category": "external",
"summary": "SUSE Bug 1256300 for CVE-2023-54014",
"url": "https://bugzilla.suse.com/1256300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54014"
},
{
"cve": "CVE-2023-54016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix memory leak in rx_desc and tx_desc\n\nCurrently when ath12k_dp_cc_desc_init() is called we allocate\nmemory to rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), during\ndescriptor cleanup rx_descs and tx_descs memory is not freed.\n\nThis is cause of memory leak. These allocated memory should be\nfreed in ath12k_dp_cc_cleanup.\n\nIn ath12k_dp_cc_desc_init(), we can save base address of rx_descs\nand tx_descs. In ath12k_dp_cc_cleanup(), we can free rx_descs and\ntx_descs memory using their base address.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54016",
"url": "https://www.suse.com/security/cve/CVE-2023-54016"
},
{
"category": "external",
"summary": "SUSE Bug 1256279 for CVE-2023-54016",
"url": "https://bugzilla.suse.com/1256279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54016"
},
{
"cve": "CVE-2023-54017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: fix possible memory leak in ibmebus_bus_init()\n\nIf device_register() returns error in ibmebus_bus_init(), name of kobject\nwhich is allocated in dev_set_name() called in device_add() is leaked.\n\nAs comment of device_add() says, it should call put_device() to drop\nthe reference count that was set in device_initialize() when it fails,\nso the name can be freed in kobject_cleanup().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54017",
"url": "https://www.suse.com/security/cve/CVE-2023-54017"
},
{
"category": "external",
"summary": "SUSE Bug 1255605 for CVE-2023-54017",
"url": "https://bugzilla.suse.com/1255605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54017"
},
{
"cve": "CVE-2023-54019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54019"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: use kernfs polling functions for PSI trigger polling\n\nDestroying psi trigger in cgroup_file_release causes UAF issues when\na cgroup is removed from under a polling process. This is happening\nbecause cgroup removal causes a call to cgroup_file_release while the\nactual file is still alive. Destroying the trigger at this point would\nalso destroy its waitqueue head and if there is still a polling process\non that file accessing the waitqueue, it will step on the freed pointer:\n\ndo_select\n vfs_poll\n do_rmdir\n cgroup_rmdir\n kernfs_drain_open_files\n cgroup_file_release\n cgroup_pressure_release\n psi_trigger_destroy\n wake_up_pollfree(\u0026t-\u003eevent_wait)\n// vfs_poll is unblocked\n synchronize_rcu\n kfree(t)\n poll_freewait -\u003e UAF access to the trigger\u0027s waitqueue head\n\nPatch [1] fixed this issue for epoll() case using wake_up_pollfree(),\nhowever the same issue exists for synchronous poll() case.\nThe root cause of this issue is that the lifecycles of the psi trigger\u0027s\nwaitqueue and of the file associated with the trigger are different. Fix\nthis by using kernfs_generic_poll function when polling on cgroup-specific\npsi triggers. It internally uses kernfs_open_node-\u003epoll waitqueue head\nwith its lifecycle tied to the file\u0027s lifecycle. This also renders the\nfix in [1] obsolete, so revert it.\n\n[1] commit c2dbe32d5db5 (\"sched/psi: Fix use-after-free in ep_remove_wait_queue()\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54019",
"url": "https://www.suse.com/security/cve/CVE-2023-54019"
},
{
"category": "external",
"summary": "SUSE Bug 1255636 for CVE-2023-54019",
"url": "https://bugzilla.suse.com/1255636"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54019"
},
{
"cve": "CVE-2023-54022",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54022"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential memory leaks at error path for UMP open\n\nThe allocation and initialization errors at alloc_midi_urbs() that is\ncalled at MIDI 2.0 / UMP device are supposed to be handled at the\ncaller side by invoking free_midi_urbs(). However, free_midi_urbs()\nloops only for ep-\u003enum_urbs entries, and since ep-\u003enum_entries wasn\u0027t\nupdated yet at the allocation / init error in alloc_midi_urbs(), this\nentry won\u0027t be released.\n\nThe intention of free_midi_urbs() is to release the whole elements, so\nchange the loop size to NUM_URBS to scan over all elements for fixing\nthe missed releases.\n\nAlso, the call of free_midi_urbs() is missing at\nsnd_usb_midi_v2_open(). Although it\u0027ll be released later at\nreopen/close or disconnection, it\u0027s better to release immediately at\nthe error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54022",
"url": "https://www.suse.com/security/cve/CVE-2023-54022"
},
{
"category": "external",
"summary": "SUSE Bug 1255545 for CVE-2023-54022",
"url": "https://bugzilla.suse.com/1255545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54022"
},
{
"cve": "CVE-2023-54023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54023"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between balance and cancel/pause\n\nSyzbot reported a panic that looks like this:\n\n assertion failed: fs_info-\u003eexclusive_operation == BTRFS_EXCLOP_BALANCE_PAUSED, in fs/btrfs/ioctl.c:465\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/messages.c:259!\n RIP: 0010:btrfs_assertfail+0x2c/0x30 fs/btrfs/messages.c:259\n Call Trace:\n \u003cTASK\u003e\n btrfs_exclop_balance fs/btrfs/ioctl.c:465 [inline]\n btrfs_ioctl_balance fs/btrfs/ioctl.c:3564 [inline]\n btrfs_ioctl+0x531e/0x5b30 fs/btrfs/ioctl.c:4632\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe reproducer is running a balance and a cancel or pause in parallel.\nThe way balance finishes is a bit wonky, if we were paused we need to\nsave the balance_ctl in the fs_info, but clear it otherwise and cleanup.\nHowever we rely on the return values being specific errors, or having a\ncancel request or no pause request. If balance completes and returns 0,\nbut we have a pause or cancel request we won\u0027t do the appropriate\ncleanup, and then the next time we try to start a balance we\u0027ll trip\nthis ASSERT.\n\nThe error handling is just wrong here, we always want to clean up,\nunless we got -ECANCELLED and we set the appropriate pause flag in the\nexclusive op. With this patch the reproducer ran for an hour without\ntripping, previously it would trip in less than a few minutes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54023",
"url": "https://www.suse.com/security/cve/CVE-2023-54023"
},
{
"category": "external",
"summary": "SUSE Bug 1256301 for CVE-2023-54023",
"url": "https://bugzilla.suse.com/1256301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54023"
},
{
"cve": "CVE-2023-54025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Do not configure WoWlan in shutdown hook if not enabled\n\nIn case WoWlan was never configured during the operation of the system,\nthe hw-\u003ewiphy-\u003ewowlan_config will be NULL. rsi_config_wowlan() checks\nwhether wowlan_config is non-NULL and if it is not, then WARNs about it.\nThe warning is valid, as during normal operation the rsi_config_wowlan()\nshould only ever be called with non-NULL wowlan_config. In shutdown this\nrsi_config_wowlan() should only ever be called if WoWlan was configured\nbefore by the user.\n\nAdd checks for non-NULL wowlan_config into the shutdown hook. While at it,\ncheck whether the wiphy is also non-NULL before accessing wowlan_config .\nDrop the single-use wowlan_config variable, just inline it into function\ncall.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54025",
"url": "https://www.suse.com/security/cve/CVE-2023-54025"
},
{
"category": "external",
"summary": "SUSE Bug 1255558 for CVE-2023-54025",
"url": "https://bugzilla.suse.com/1255558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54025"
},
{
"cve": "CVE-2023-54026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopp: Fix use-after-free in lazy_opp_tables after probe deferral\n\nWhen dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns\n-EPROBE_DEFER, the opp_table is freed again, to wait until all the\ninterconnect paths are available.\n\nHowever, if the OPP table is using required-opps then it may already\nhave been added to the global lazy_opp_tables list. The error path\ndoes not remove the opp_table from the list again.\n\nThis can cause crashes later when the provider of the required-opps\nis added, since we will iterate over OPP tables that have already been\nfreed. E.g.:\n\n Unable to handle kernel NULL pointer dereference when read\n CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3\n PC is at _of_add_opp_table_v2 (include/linux/of.h:949\n drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404\n drivers/opp/of.c:1032) -\u003e lazy_link_required_opp_table()\n\nFix this by calling _of_clear_opp_table() to remove the opp_table from\nthe list and clear other allocated resources. While at it, also add the\nmissing mutex_destroy() calls in the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54026",
"url": "https://www.suse.com/security/cve/CVE-2023-54026"
},
{
"category": "external",
"summary": "SUSE Bug 1255549 for CVE-2023-54026",
"url": "https://bugzilla.suse.com/1255549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54026"
},
{
"cve": "CVE-2023-54027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: core: Prevent invalid memory access when there is no parent\n\nCommit 813665564b3d (\"iio: core: Convert to use firmware node handle\ninstead of OF node\") switched the kind of nodes to use for label\nretrieval in device registration. Probably an unwanted change in that\ncommit was that if the device has no parent then NULL pointer is\naccessed. This is what happens in the stock IIO dummy driver when a\nnew entry is created in configfs:\n\n # mkdir /sys/kernel/config/iio/devices/dummy/foo\n BUG: kernel NULL pointer dereference, address: ...\n ...\n Call Trace:\n __iio_device_register\n iio_dummy_probe\n\nSince there seems to be no reason to make a parent device of an IIO\ndummy device mandatory, let\u0027s prevent the invalid memory access in\n__iio_device_register when the parent device is NULL. With this\nchange, the IIO dummy driver works fine with configfs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54027",
"url": "https://www.suse.com/security/cve/CVE-2023-54027"
},
{
"category": "external",
"summary": "SUSE Bug 1255579 for CVE-2023-54027",
"url": "https://bugzilla.suse.com/1255579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54027"
},
{
"cve": "CVE-2023-54030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/net: don\u0027t overflow multishot recv\n\nDon\u0027t allow overflowing multishot recv CQEs, it might get out of\nhand, hurt performance, and in the worst case scenario OOM the task.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54030",
"url": "https://www.suse.com/security/cve/CVE-2023-54030"
},
{
"category": "external",
"summary": "SUSE Bug 1255691 for CVE-2023-54030",
"url": "https://bugzilla.suse.com/1255691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54030"
},
{
"cve": "CVE-2023-54031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvdpa: Add queue index attr to vdpa_nl_policy for nlattr length check\n\nThe vdpa_nl_policy structure is used to validate the nlattr when parsing\nthe incoming nlmsg. It will ensure the attribute being described produces\na valid nlattr pointer in info-\u003eattrs before entering into each handler\nin vdpa_nl_ops.\n\nThat is to say, the missing part in vdpa_nl_policy may lead to illegal\nnlattr after parsing, which could lead to OOB read just like CVE-2023-3773.\n\nThis patch adds the missing nla_policy for vdpa queue index attr to avoid\nsuch bugs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54031",
"url": "https://www.suse.com/security/cve/CVE-2023-54031"
},
{
"category": "external",
"summary": "SUSE Bug 1255583 for CVE-2023-54031",
"url": "https://bugzilla.suse.com/1255583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54031"
},
{
"cve": "CVE-2023-54032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54032"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race when deleting quota root from the dirty cow roots list\n\nWhen disabling quotas we are deleting the quota root from the list\nfs_info-\u003edirty_cowonly_roots without taking the lock that protects it,\nwhich is struct btrfs_fs_info::trans_lock. This unsynchronized list\nmanipulation may cause chaos if there\u0027s another concurrent manipulation\nof this list, such as when adding a root to it with\nctree.c:add_root_to_dirty_list().\n\nThis can result in all sorts of weird failures caused by a race, such as\nthe following crash:\n\n [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI\n [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.279928] Code: 85 38 06 00 (...)\n [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206\n [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000\n [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070\n [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b\n [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600\n [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48\n [337571.281723] FS: 00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000\n [337571.281950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0\n [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [337571.282874] Call Trace:\n [337571.283101] \u003cTASK\u003e\n [337571.283327] ? __die_body+0x1b/0x60\n [337571.283570] ? die_addr+0x39/0x60\n [337571.283796] ? exc_general_protection+0x22e/0x430\n [337571.284022] ? asm_exc_general_protection+0x22/0x30\n [337571.284251] ? commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.284531] btrfs_commit_transaction+0x42e/0xf90 [btrfs]\n [337571.284803] ? _raw_spin_unlock+0x15/0x30\n [337571.285031] ? release_extent_buffer+0x103/0x130 [btrfs]\n [337571.285305] reset_balance_state+0x152/0x1b0 [btrfs]\n [337571.285578] btrfs_balance+0xa50/0x11e0 [btrfs]\n [337571.285864] ? __kmem_cache_alloc_node+0x14a/0x410\n [337571.286086] btrfs_ioctl+0x249a/0x3320 [btrfs]\n [337571.286358] ? mod_objcg_state+0xd2/0x360\n [337571.286577] ? refill_obj_stock+0xb0/0x160\n [337571.286798] ? seq_release+0x25/0x30\n [337571.287016] ? __rseq_handle_notify_resume+0x3ba/0x4b0\n [337571.287235] ? percpu_counter_add_batch+0x2e/0xa0\n [337571.287455] ? __x64_sys_ioctl+0x88/0xc0\n [337571.287675] __x64_sys_ioctl+0x88/0xc0\n [337571.287901] do_syscall_64+0x38/0x90\n [337571.288126] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n [337571.288352] RIP: 0033:0x7f478aaffe9b\n\nSo fix this by locking struct btrfs_fs_info::trans_lock before deleting\nthe quota root from that list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54032",
"url": "https://www.suse.com/security/cve/CVE-2023-54032"
},
{
"category": "external",
"summary": "SUSE Bug 1255617 for CVE-2023-54032",
"url": "https://bugzilla.suse.com/1255617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54032"
},
{
"cve": "CVE-2023-54035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix underflow in chain reference counter\n\nSet element addition error path decrements reference counter on chains\ntwice: once on element release and again via nft_data_release().\n\nThen, d6b478666ffa (\"netfilter: nf_tables: fix underflow in object\nreference counter\") incorrectly fixed this by removing the stateful\nobject reference count decrement.\n\nRestore the stateful object decrement as in b91d90368837 (\"netfilter:\nnf_tables: fix leaking object reference count\") and let\nnft_data_release() decrement the chain reference counter, so this is\ndone only once.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54035",
"url": "https://www.suse.com/security/cve/CVE-2023-54035"
},
{
"category": "external",
"summary": "SUSE Bug 1255563 for CVE-2023-54035",
"url": "https://bugzilla.suse.com/1255563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54035"
},
{
"cve": "CVE-2023-54037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: prevent NULL pointer deref during reload\n\nCalling ethtool during reload can lead to call trace, because VSI isn\u0027t\nconfigured for some time, but netdev is alive.\n\nTo fix it add rtnl lock for VSI deconfig and config. Set ::num_q_vectors\nto 0 after freeing and add a check for ::tx/rx_rings in ring related\nethtool ops.\n\nAdd proper unroll of filters in ice_start_eth().\n\nReproduction:\n$watch -n 0.1 -d \u0027ethtool -g enp24s0f0np0\u0027\n$devlink dev reload pci/0000:18:00.0 action driver_reinit\n\nCall trace before fix:\n[66303.926205] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[66303.926259] #PF: supervisor read access in kernel mode\n[66303.926286] #PF: error_code(0x0000) - not-present page\n[66303.926311] PGD 0 P4D 0\n[66303.926332] Oops: 0000 [#1] PREEMPT SMP PTI\n[66303.926358] CPU: 4 PID: 933821 Comm: ethtool Kdump: loaded Tainted: G OE 6.4.0-rc5+ #1\n[66303.926400] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.00.01.0014.070920180847 07/09/2018\n[66303.926446] RIP: 0010:ice_get_ringparam+0x22/0x50 [ice]\n[66303.926649] Code: 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 48 8b 87 c0 09 00 00 c7 46 04 e0 1f 00 00 c7 46 10 e0 1f 00 00 48 8b 50 20 \u003c48\u003e 8b 12 0f b7 52 3a 89 56 14 48 8b 40 28 48 8b 00 0f b7 40 58 48\n[66303.926722] RSP: 0018:ffffad40472f39c8 EFLAGS: 00010246\n[66303.926749] RAX: ffff98a8ada05828 RBX: ffff98a8c46dd060 RCX: ffffad40472f3b48\n[66303.926781] RDX: 0000000000000000 RSI: ffff98a8c46dd068 RDI: ffff98a8b23c4000\n[66303.926811] RBP: ffffad40472f3b48 R08: 00000000000337b0 R09: 0000000000000000\n[66303.926843] R10: 0000000000000001 R11: 0000000000000100 R12: ffff98a8b23c4000\n[66303.926874] R13: ffff98a8c46dd060 R14: 000000000000000f R15: ffffad40472f3a50\n[66303.926906] FS: 00007f6397966740(0000) GS:ffff98b390900000(0000) knlGS:0000000000000000\n[66303.926941] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[66303.926967] CR2: 0000000000000000 CR3: 000000011ac20002 CR4: 00000000007706e0\n[66303.926999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[66303.927029] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[66303.927060] PKRU: 55555554\n[66303.927075] Call Trace:\n[66303.927094] \u003cTASK\u003e\n[66303.927111] ? __die+0x23/0x70\n[66303.927140] ? page_fault_oops+0x171/0x4e0\n[66303.927176] ? exc_page_fault+0x7f/0x180\n[66303.927209] ? asm_exc_page_fault+0x26/0x30\n[66303.927244] ? ice_get_ringparam+0x22/0x50 [ice]\n[66303.927433] rings_prepare_data+0x62/0x80\n[66303.927469] ethnl_default_doit+0xe2/0x350\n[66303.927501] genl_family_rcv_msg_doit.isra.0+0xe3/0x140\n[66303.927538] genl_rcv_msg+0x1b1/0x2c0\n[66303.927561] ? __pfx_ethnl_default_doit+0x10/0x10\n[66303.927590] ? __pfx_genl_rcv_msg+0x10/0x10\n[66303.927615] netlink_rcv_skb+0x58/0x110\n[66303.927644] genl_rcv+0x28/0x40\n[66303.927665] netlink_unicast+0x19e/0x290\n[66303.927691] netlink_sendmsg+0x254/0x4d0\n[66303.927717] sock_sendmsg+0x93/0xa0\n[66303.927743] __sys_sendto+0x126/0x170\n[66303.927780] __x64_sys_sendto+0x24/0x30\n[66303.928593] do_syscall_64+0x5d/0x90\n[66303.929370] ? __count_memcg_events+0x60/0xa0\n[66303.930146] ? count_memcg_events.constprop.0+0x1a/0x30\n[66303.930920] ? handle_mm_fault+0x9e/0x350\n[66303.931688] ? do_user_addr_fault+0x258/0x740\n[66303.932452] ? exc_page_fault+0x7f/0x180\n[66303.933193] entry_SYSCALL_64_after_hwframe+0x72/0xdc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54037",
"url": "https://www.suse.com/security/cve/CVE-2023-54037"
},
{
"category": "external",
"summary": "SUSE Bug 1255557 for CVE-2023-54037",
"url": "https://bugzilla.suse.com/1255557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54037"
},
{
"cve": "CVE-2023-54038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link\n\nhci_connect_sco currently returns NULL when there is no link (i.e. when\nhci_conn_link() returns NULL).\n\nsco_connect() expects an ERR_PTR in case of any error (see line 266 in\nsco.c). Thus, hcon set as NULL passes through to sco_conn_add(), which\ntries to get hcon-\u003ehdev, resulting in dereferencing a NULL pointer as\nreported by syzkaller.\n\nThe same issue exists for iso_connect_cis() calling hci_connect_cis().\n\nThus, make hci_connect_sco() and hci_connect_cis() return ERR_PTR\ninstead of NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54038",
"url": "https://www.suse.com/security/cve/CVE-2023-54038"
},
{
"category": "external",
"summary": "SUSE Bug 1255540 for CVE-2023-54038",
"url": "https://bugzilla.suse.com/1255540"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54038"
},
{
"cve": "CVE-2023-54042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54042"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: Fix VAS mm use after free\n\nThe refcount on mm is dropped before the coprocessor is detached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54042",
"url": "https://www.suse.com/security/cve/CVE-2023-54042"
},
{
"category": "external",
"summary": "SUSE Bug 1255702 for CVE-2023-54042",
"url": "https://bugzilla.suse.com/1255702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-54042"
},
{
"cve": "CVE-2023-54045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54045"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: fix possible soft lockup in __audit_inode_child()\n\nTracefs or debugfs maybe cause hundreds to thousands of PATH records,\ntoo many PATH records maybe cause soft lockup.\n\nFor example:\n 1. CONFIG_KASAN=y \u0026\u0026 CONFIG_PREEMPTION=n\n 2. auditctl -a exit,always -S open -k key\n 3. sysctl -w kernel.watchdog_thresh=5\n 4. mkdir /sys/kernel/debug/tracing/instances/test\n\nThere may be a soft lockup as follows:\n watchdog: BUG: soft lockup - CPU#45 stuck for 7s! [mkdir:15498]\n Kernel panic - not syncing: softlockup: hung tasks\n Call trace:\n dump_backtrace+0x0/0x30c\n show_stack+0x20/0x30\n dump_stack+0x11c/0x174\n panic+0x27c/0x494\n watchdog_timer_fn+0x2bc/0x390\n __run_hrtimer+0x148/0x4fc\n __hrtimer_run_queues+0x154/0x210\n hrtimer_interrupt+0x2c4/0x760\n arch_timer_handler_phys+0x48/0x60\n handle_percpu_devid_irq+0xe0/0x340\n __handle_domain_irq+0xbc/0x130\n gic_handle_irq+0x78/0x460\n el1_irq+0xb8/0x140\n __audit_inode_child+0x240/0x7bc\n tracefs_create_file+0x1b8/0x2a0\n trace_create_file+0x18/0x50\n event_create_dir+0x204/0x30c\n __trace_add_new_event+0xac/0x100\n event_trace_add_tracer+0xa0/0x130\n trace_array_create_dir+0x60/0x140\n trace_array_create+0x1e0/0x370\n instance_mkdir+0x90/0xd0\n tracefs_syscall_mkdir+0x68/0xa0\n vfs_mkdir+0x21c/0x34c\n do_mkdirat+0x1b4/0x1d4\n __arm64_sys_mkdirat+0x4c/0x60\n el0_svc_common.constprop.0+0xa8/0x240\n do_el0_svc+0x8c/0xc0\n el0_svc+0x20/0x30\n el0_sync_handler+0xb0/0xb4\n el0_sync+0x160/0x180\n\nTherefore, we add cond_resched() to __audit_inode_child() to fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54045",
"url": "https://www.suse.com/security/cve/CVE-2023-54045"
},
{
"category": "external",
"summary": "SUSE Bug 1256285 for CVE-2023-54045",
"url": "https://bugzilla.suse.com/1256285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Prevent handling any completions after qp destroy\n\nHW may generate completions that indicates QP is destroyed.\nDriver should not be scheduling any more completion handlers\nfor this QP, after the QP is destroyed. Since CQs are active\nduring the QP destroy, driver may still schedule completion\nhandlers. This can cause a race where the destroy_cq and poll_cq\nrunning simultaneously.\n\nSnippet of kernel panic while doing bnxt_re driver load unload in loop.\nThis indicates a poll after the CQ is freed. \n\n[77786.481636] Call Trace:\n[77786.481640] \u003cTASK\u003e\n[77786.481644] bnxt_re_poll_cq+0x14a/0x620 [bnxt_re]\n[77786.481658] ? kvm_clock_read+0x14/0x30\n[77786.481693] __ib_process_cq+0x57/0x190 [ib_core]\n[77786.481728] ib_cq_poll_work+0x26/0x80 [ib_core]\n[77786.481761] process_one_work+0x1e5/0x3f0\n[77786.481768] worker_thread+0x50/0x3a0\n[77786.481785] ? __pfx_worker_thread+0x10/0x10\n[77786.481790] kthread+0xe2/0x110\n[77786.481794] ? __pfx_kthread+0x10/0x10\n[77786.481797] ret_from_fork+0x2c/0x50\n\nTo avoid this, complete all completion handlers before returning the\ndestroy QP. If free_cq is called soon after destroy_qp, IB stack\nwill cancel the CQ work before invoking the destroy_cq verb and\nthis will prevent any race mentioned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54048",
"url": "https://www.suse.com/security/cve/CVE-2023-54048"
},
{
"category": "external",
"summary": "SUSE Bug 1256395 for CVE-2023-54048",
"url": "https://bugzilla.suse.com/1256395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54048"
},
{
"cve": "CVE-2023-54049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: glink: Add check for kstrdup\n\nAdd check for the return value of kstrdup() and return the error\nif it fails in order to avoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54049",
"url": "https://www.suse.com/security/cve/CVE-2023-54049"
},
{
"category": "external",
"summary": "SUSE Bug 1256396 for CVE-2023-54049",
"url": "https://bugzilla.suse.com/1256396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54049"
},
{
"cve": "CVE-2023-54051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54051"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not allow gso_size to be set to GSO_BY_FRAGS\n\nOne missing check in virtio_net_hdr_to_skb() allowed\nsyzbot to crash kernels again [1]\n\nDo not allow gso_size to be set to GSO_BY_FRAGS (0xffff),\nbecause this magic value is used by the kernel.\n\n[1]\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 0 PID: 5039 Comm: syz-executor401 Not tainted 6.5.0-rc5-next-20230809-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\nRIP: 0010:skb_segment+0x1a52/0x3ef0 net/core/skbuff.c:4500\nCode: 00 00 00 e9 ab eb ff ff e8 6b 96 5d f9 48 8b 84 24 00 01 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e ea 21 00 00 48 8b 84 24 00 01\nRSP: 0018:ffffc90003d3f1c8 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 000000000001fffe RCX: 0000000000000000\nRDX: 000000000000000e RSI: ffffffff882a3115 RDI: 0000000000000070\nRBP: ffffc90003d3f378 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 5ee4a93e456187d6 R12: 000000000001ffc6\nR13: dffffc0000000000 R14: 0000000000000008 R15: 000000000000ffff\nFS: 00005555563f2380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020020000 CR3: 000000001626d000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\nudp6_ufo_fragment+0x9d2/0xd50 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x5c4/0x17b0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x292/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x3a5/0xf10 net/core/dev.c:3625\n__dev_queue_xmit+0x8f0/0x3d60 net/core/dev.c:4329\ndev_queue_xmit include/linux/netdevice.h:3082 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c7/0x5570 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:727 [inline]\nsock_sendmsg+0xd9/0x180 net/socket.c:750\n____sys_sendmsg+0x6ac/0x940 net/socket.c:2496\n___sys_sendmsg+0x135/0x1d0 net/socket.c:2550\n__sys_sendmsg+0x117/0x1e0 net/socket.c:2579\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7ff27cdb34d9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54051",
"url": "https://www.suse.com/security/cve/CVE-2023-54051"
},
{
"category": "external",
"summary": "SUSE Bug 1256394 for CVE-2023-54051",
"url": "https://bugzilla.suse.com/1256394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54052"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921: fix skb leak by txs missing in AMSDU\n\ntxs may be dropped if the frame is aggregated in AMSDU. When the problem\nshows up, some SKBs would be hold in driver to cause network stopped\ntemporarily. Even if the problem can be recovered by txs timeout handling,\nmt7921 still need to disable txs in AMSDU to avoid this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54052",
"url": "https://www.suse.com/security/cve/CVE-2023-54052"
},
{
"category": "external",
"summary": "SUSE Bug 1256387 for CVE-2023-54052",
"url": "https://bugzilla.suse.com/1256387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54052"
},
{
"cve": "CVE-2023-54060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: Set end correctly when doing batch carry\n\nEven though the test suite covers this it somehow became obscured that\nthis wasn\u0027t working.\n\nThe test iommufd_ioas.mock_domain.access_domain_destory would blow up\nrarely.\n\nend should be set to 1 because this just pushed an item, the carry, to the\npfns list.\n\nSometimes the test would blow up with:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP\n CPU: 5 PID: 584 Comm: iommufd Not tainted 6.5.0-rc1-dirty #1236\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:batch_unpin+0xa2/0x100 [iommufd]\n Code: 17 48 81 fe ff ff 07 00 77 70 48 8b 15 b7 be 97 e2 48 85 d2 74 14 48 8b 14 fa 48 85 d2 74 0b 40 0f b6 f6 48 c1 e6 04 48 01 f2 \u003c48\u003e 8b 3a 48 c1 e0 06 89 ca 48 89 de 48 83 e7 f0 48 01 c7 e8 96 dc\n RSP: 0018:ffffc90001677a58 EFLAGS: 00010246\n RAX: 00007f7e2646f000 RBX: 0000000000000000 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: 00000000fefc4c8d RDI: 0000000000fefc4c\n RBP: ffffc90001677a80 R08: 0000000000000048 R09: 0000000000000200\n R10: 0000000000030b98 R11: ffffffff81f3bb40 R12: 0000000000000001\n R13: ffff888101f75800 R14: ffffc90001677ad0 R15: 00000000000001fe\n FS: 00007f9323679740(0000) GS:ffff8881ba540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000105ede003 CR4: 00000000003706a0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n ? show_regs+0x5c/0x70\n ? __die+0x1f/0x60\n ? page_fault_oops+0x15d/0x440\n ? lock_release+0xbc/0x240\n ? exc_page_fault+0x4a4/0x970\n ? asm_exc_page_fault+0x27/0x30\n ? batch_unpin+0xa2/0x100 [iommufd]\n ? batch_unpin+0xba/0x100 [iommufd]\n __iopt_area_unfill_domain+0x198/0x430 [iommufd]\n ? __mutex_lock+0x8c/0xb80\n ? __mutex_lock+0x6aa/0xb80\n ? xa_erase+0x28/0x30\n ? iopt_table_remove_domain+0x162/0x320 [iommufd]\n ? lock_release+0xbc/0x240\n iopt_area_unfill_domain+0xd/0x10 [iommufd]\n iopt_table_remove_domain+0x195/0x320 [iommufd]\n iommufd_hw_pagetable_destroy+0xb3/0x110 [iommufd]\n iommufd_object_destroy_user+0x8e/0xf0 [iommufd]\n iommufd_device_detach+0xc5/0x140 [iommufd]\n iommufd_selftest_destroy+0x1f/0x70 [iommufd]\n iommufd_object_destroy_user+0x8e/0xf0 [iommufd]\n iommufd_destroy+0x3a/0x50 [iommufd]\n iommufd_fops_ioctl+0xfb/0x170 [iommufd]\n __x64_sys_ioctl+0x40d/0x9a0\n do_syscall_64+0x3c/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54060",
"url": "https://www.suse.com/security/cve/CVE-2023-54060"
},
{
"category": "external",
"summary": "SUSE Bug 1256379 for CVE-2023-54060",
"url": "https://bugzilla.suse.com/1256379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54060"
},
{
"cve": "CVE-2023-54064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi:ssif: Fix a memory leak when scanning for an adapter\n\nThe adapter scan ssif_info_find() sets info-\u003eadapter_name if the adapter\ninfo came from SMBIOS, as it\u0027s not set in that case. However, this\nfunction can be called more than once, and it will leak the adapter name\nif it had already been set. So check for NULL before setting it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54064",
"url": "https://www.suse.com/security/cve/CVE-2023-54064"
},
{
"category": "external",
"summary": "SUSE Bug 1256375 for CVE-2023-54064",
"url": "https://bugzilla.suse.com/1256375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54064"
},
{
"cve": "CVE-2023-54066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer\n\nIn gl861_i2c_master_xfer, msg is controlled by user. When msg[i].buf\nis null and msg[i].len is zero, former checks on msg[i].buf would be\npassed. Malicious data finally reach gl861_i2c_master_xfer. If accessing\nmsg[i].buf[0] without sanity check, null ptr deref would happen.\nWe add check on msg[i].len to prevent crash.\n\nSimilar commit:\ncommit 0ed554fd769a\n(\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54066",
"url": "https://www.suse.com/security/cve/CVE-2023-54066"
},
{
"category": "external",
"summary": "SUSE Bug 1256373 for CVE-2023-54066",
"url": "https://bugzilla.suse.com/1256373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54066"
},
{
"cve": "CVE-2023-54067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54067"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race when deleting free space root from the dirty cow roots list\n\nWhen deleting the free space tree we are deleting the free space root\nfrom the list fs_info-\u003edirty_cowonly_roots without taking the lock that\nprotects it, which is struct btrfs_fs_info::trans_lock.\nThis unsynchronized list manipulation may cause chaos if there\u0027s another\nconcurrent manipulation of this list, such as when adding a root to it\nwith ctree.c:add_root_to_dirty_list().\n\nThis can result in all sorts of weird failures caused by a race, such as\nthe following crash:\n\n [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI\n [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.279928] Code: 85 38 06 00 (...)\n [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206\n [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000\n [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070\n [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b\n [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600\n [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48\n [337571.281723] FS: 00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000\n [337571.281950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0\n [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [337571.282874] Call Trace:\n [337571.283101] \u003cTASK\u003e\n [337571.283327] ? __die_body+0x1b/0x60\n [337571.283570] ? die_addr+0x39/0x60\n [337571.283796] ? exc_general_protection+0x22e/0x430\n [337571.284022] ? asm_exc_general_protection+0x22/0x30\n [337571.284251] ? commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.284531] btrfs_commit_transaction+0x42e/0xf90 [btrfs]\n [337571.284803] ? _raw_spin_unlock+0x15/0x30\n [337571.285031] ? release_extent_buffer+0x103/0x130 [btrfs]\n [337571.285305] reset_balance_state+0x152/0x1b0 [btrfs]\n [337571.285578] btrfs_balance+0xa50/0x11e0 [btrfs]\n [337571.285864] ? __kmem_cache_alloc_node+0x14a/0x410\n [337571.286086] btrfs_ioctl+0x249a/0x3320 [btrfs]\n [337571.286358] ? mod_objcg_state+0xd2/0x360\n [337571.286577] ? refill_obj_stock+0xb0/0x160\n [337571.286798] ? seq_release+0x25/0x30\n [337571.287016] ? __rseq_handle_notify_resume+0x3ba/0x4b0\n [337571.287235] ? percpu_counter_add_batch+0x2e/0xa0\n [337571.287455] ? __x64_sys_ioctl+0x88/0xc0\n [337571.287675] __x64_sys_ioctl+0x88/0xc0\n [337571.287901] do_syscall_64+0x38/0x90\n [337571.288126] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n [337571.288352] RIP: 0033:0x7f478aaffe9b\n\nSo fix this by locking struct btrfs_fs_info::trans_lock before deleting\nthe free space root from that list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54067",
"url": "https://www.suse.com/security/cve/CVE-2023-54067"
},
{
"category": "external",
"summary": "SUSE Bug 1256369 for CVE-2023-54067",
"url": "https://bugzilla.suse.com/1256369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54067"
},
{
"cve": "CVE-2023-54069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix BUG in ext4_mb_new_inode_pa() due to overflow\n\nWhen we calculate the end position of ext4_free_extent, this position may\nbe exactly where ext4_lblk_t (i.e. uint) overflows. For example, if\nac_g_ex.fe_logical is 4294965248 and ac_orig_goal_len is 2048, then the\ncomputed end is 0x100000000, which is 0. If ac-\u003eac_o_ex.fe_logical is not\nthe first case of adjusting the best extent, that is, new_bex_end \u003e 0, the\nfollowing BUG_ON will be triggered:\n\n=========================================================\nkernel BUG at fs/ext4/mballoc.c:5116!\ninvalid opcode: 0000 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 673 Comm: xfs_io Tainted: G E 6.5.0-rc1+ #279\nRIP: 0010:ext4_mb_new_inode_pa+0xc5/0x430\nCall Trace:\n \u003cTASK\u003e\n ext4_mb_use_best_found+0x203/0x2f0\n ext4_mb_try_best_found+0x163/0x240\n ext4_mb_regular_allocator+0x158/0x1550\n ext4_mb_new_blocks+0x86a/0xe10\n ext4_ext_map_blocks+0xb0c/0x13a0\n ext4_map_blocks+0x2cd/0x8f0\n ext4_iomap_begin+0x27b/0x400\n iomap_iter+0x222/0x3d0\n __iomap_dio_rw+0x243/0xcb0\n iomap_dio_rw+0x16/0x80\n=========================================================\n\nA simple reproducer demonstrating the problem:\n\n\tmkfs.ext4 -F /dev/sda -b 4096 100M\n\tmount /dev/sda /tmp/test\n\tfallocate -l1M /tmp/test/tmp\n\tfallocate -l10M /tmp/test/file\n\tfallocate -i -o 1M -l16777203M /tmp/test/file\n\tfsstress -d /tmp/test -l 0 -n 100000 -p 8 \u0026\n\tsleep 10 \u0026\u0026 killall -9 fsstress\n\trm -f /tmp/test/tmp\n\txfs_io -c \"open -ad /tmp/test/file\" -c \"pwrite -S 0xff 0 8192\"\n\nWe simply refactor the logic for adjusting the best extent by adding\na temporary ext4_free_extent ex and use extent_logical_end() to avoid\noverflow, which also simplifies the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54069",
"url": "https://www.suse.com/security/cve/CVE-2023-54069"
},
{
"category": "external",
"summary": "SUSE Bug 1256371 for CVE-2023-54069",
"url": "https://bugzilla.suse.com/1256371"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54069"
},
{
"cve": "CVE-2023-54070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: clean up in all error paths when enabling SR-IOV\n\nAfter commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"), removing\nthe igb module could hang or crash (depending on the machine) when the\nmodule has been loaded with the max_vfs parameter set to some value != 0.\n\nIn case of one test machine with a dual port 82580, this hang occurred:\n\n[ 232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1\n[ 233.093257] igb 0000:41:00.1: IOV Disabled\n[ 233.329969] pcieport 0000:40:01.0: AER: Multiple Uncorrected (Non-Fatal) err0\n[ 233.340302] igb 0000:41:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.352248] igb 0000:41:00.0: device [8086:1516] error status/mask=00100000\n[ 233.361088] igb 0000:41:00.0: [20] UnsupReq (First)\n[ 233.368183] igb 0000:41:00.0: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.376846] igb 0000:41:00.1: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.388779] igb 0000:41:00.1: device [8086:1516] error status/mask=00100000\n[ 233.397629] igb 0000:41:00.1: [20] UnsupReq (First)\n[ 233.404736] igb 0000:41:00.1: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.538214] pci 0000:41:00.1: AER: can\u0027t recover (no error_detected callback)\n[ 233.538401] igb 0000:41:00.0: removed PHC on enp65s0f0\n[ 233.546197] pcieport 0000:40:01.0: AER: device recovery failed\n[ 234.157244] igb 0000:41:00.0: IOV Disabled\n[ 371.619705] INFO: task irq/35-aerdrv:257 blocked for more than 122 seconds.\n[ 371.627489] Not tainted 6.4.0-dirty #2\n[ 371.632257] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this.\n[ 371.641000] task:irq/35-aerdrv state:D stack:0 pid:257 ppid:2 f0\n[ 371.650330] Call Trace:\n[ 371.653061] \u003cTASK\u003e\n[ 371.655407] __schedule+0x20e/0x660\n[ 371.659313] schedule+0x5a/0xd0\n[ 371.662824] schedule_preempt_disabled+0x11/0x20\n[ 371.667983] __mutex_lock.constprop.0+0x372/0x6c0\n[ 371.673237] ? __pfx_aer_root_reset+0x10/0x10\n[ 371.678105] report_error_detected+0x25/0x1c0\n[ 371.682974] ? __pfx_report_normal_detected+0x10/0x10\n[ 371.688618] pci_walk_bus+0x72/0x90\n[ 371.692519] pcie_do_recovery+0xb2/0x330\n[ 371.696899] aer_process_err_devices+0x117/0x170\n[ 371.702055] aer_isr+0x1c0/0x1e0\n[ 371.705661] ? __set_cpus_allowed_ptr+0x54/0xa0\n[ 371.710723] ? __pfx_irq_thread_fn+0x10/0x10\n[ 371.715496] irq_thread_fn+0x20/0x60\n[ 371.719491] irq_thread+0xe6/0x1b0\n[ 371.723291] ? __pfx_irq_thread_dtor+0x10/0x10\n[ 371.728255] ? __pfx_irq_thread+0x10/0x10\n[ 371.732731] kthread+0xe2/0x110\n[ 371.736243] ? __pfx_kthread+0x10/0x10\n[ 371.740430] ret_from_fork+0x2c/0x50\n[ 371.744428] \u003c/TASK\u003e\n\nThe reproducer was a simple script:\n\n #!/bin/sh\n for i in `seq 1 5`; do\n modprobe -rv igb\n modprobe -v igb max_vfs=1\n sleep 1\n modprobe -rv igb\n done\n\nIt turned out that this could only be reproduce on 82580 (quad and\ndual-port), but not on 82576, i350 and i210. Further debugging showed\nthat igb_enable_sriov()\u0027s call to pci_enable_sriov() is failing, because\ndev-\u003eis_physfn is 0 on 82580.\n\nPrior to commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"),\nigb_enable_sriov() jumped into the \"err_out\" cleanup branch. After this\ncommit it only returned the error code.\n\nSo the cleanup didn\u0027t take place, and the incorrect VF setup in the\nigb_adapter structure fooled the igb driver into assuming that VFs have\nbeen set up where no VF actually existed.\n\nFix this problem by cleaning up again if pci_enable_sriov() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54070",
"url": "https://www.suse.com/security/cve/CVE-2023-54070"
},
{
"category": "external",
"summary": "SUSE Bug 1256364 for CVE-2023-54070",
"url": "https://bugzilla.suse.com/1256364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix potential data race at PCM memory allocation helpers\n\nThe PCM memory allocation helpers have a sanity check against too many\nbuffer allocations. However, the check is performed without a proper\nlock and the allocation isn\u0027t serialized; this allows user to allocate\nmore memories than predefined max size.\n\nPractically seen, this isn\u0027t really a big problem, as it\u0027s more or\nless some \"soft limit\" as a sanity check, and it\u0027s not possible to\nallocate unlimitedly. But it\u0027s still better to address this for more\nconsistent behavior.\n\nThe patch covers the size check in do_alloc_pages() with the\ncard-\u003ememory_mutex, and increases the allocated size there for\npreventing the further overflow. When the actual allocation fails,\nthe size is decreased accordingly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54072",
"url": "https://www.suse.com/security/cve/CVE-2023-54072"
},
{
"category": "external",
"summary": "SUSE Bug 1256291 for CVE-2023-54072",
"url": "https://bugzilla.suse.com/1256291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54072"
},
{
"cve": "CVE-2023-54076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix missed ses refcounting\n\nUse new cifs_smb_ses_inc_refcount() helper to get an active reference\nof @ses and @ses-\u003edfs_root_ses (if set). This will prevent\n@ses-\u003edfs_root_ses of being put in the next call to cifs_put_smb_ses()\nand thus potentially causing an use-after-free bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54076",
"url": "https://www.suse.com/security/cve/CVE-2023-54076"
},
{
"category": "external",
"summary": "SUSE Bug 1256335 for CVE-2023-54076",
"url": "https://bugzilla.suse.com/1256335"
},
{
"category": "external",
"summary": "SUSE Bug 1256450 for CVE-2023-54076",
"url": "https://bugzilla.suse.com/1256450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-54076"
},
{
"cve": "CVE-2023-54080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: skip splitting and logical rewriting on pre-alloc write\n\nWhen doing a relocation, there is a chance that at the time of\nbtrfs_reloc_clone_csums(), there is no checksum for the corresponding\nregion.\n\nIn this case, btrfs_finish_ordered_zoned()\u0027s sum points to an invalid item\nand so ordered_extent\u0027s logical is set to some invalid value. Then,\nbtrfs_lookup_block_group() in btrfs_zone_finish_endio() failed to find a\nblock group and will hit an assert or a null pointer dereference as\nfollowing.\n\nThis can be reprodcued by running btrfs/028 several times (e.g, 4 to 16\ntimes) with a null_blk setup. The device\u0027s zone size and capacity is set to\n32 MB and the storage size is set to 5 GB on my setup.\n\n KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n CPU: 6 PID: 3105720 Comm: kworker/u16:13 Tainted: G W 6.5.0-rc6-kts+ #1\n Hardware name: Supermicro Super Server/X10SRL-F, BIOS 2.0 12/17/2015\n Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]\n RIP: 0010:btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n Code: 41 54 49 89 fc 55 48 89 f5 53 e8 57 7d fc ff 48 8d b8 88 00 00 00 48 89 c3 48 b8 00 00 00 00 00\n \u003e 3c 02 00 0f 85 02 01 00 00 f6 83 88 00 00 00 01 0f 84 a8 00 00\n RSP: 0018:ffff88833cf87b08 EFLAGS: 00010206\n RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000011 RSI: 0000000000000004 RDI: 0000000000000088\n RBP: 0000000000000002 R08: 0000000000000001 R09: ffffed102877b827\n R10: ffff888143bdc13b R11: ffff888125b1cbc0 R12: ffff888143bdc000\n R13: 0000000000007000 R14: ffff888125b1cba8 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88881e500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f3ed85223d5 CR3: 00000001519b4005 CR4: 00000000001706e0\n Call Trace:\n \u003cTASK\u003e\n ? die_addr+0x3c/0xa0\n ? exc_general_protection+0x148/0x220\n ? asm_exc_general_protection+0x22/0x30\n ? btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n ? btrfs_zone_finish_endio.part.0+0x19/0x160 [btrfs]\n btrfs_finish_one_ordered+0x7b8/0x1de0 [btrfs]\n ? rcu_is_watching+0x11/0xb0\n ? lock_release+0x47a/0x620\n ? btrfs_finish_ordered_zoned+0x59b/0x800 [btrfs]\n ? __pfx_btrfs_finish_one_ordered+0x10/0x10 [btrfs]\n ? btrfs_finish_ordered_zoned+0x358/0x800 [btrfs]\n ? __smp_call_single_queue+0x124/0x350\n ? rcu_is_watching+0x11/0xb0\n btrfs_work_helper+0x19f/0xc60 [btrfs]\n ? __pfx_try_to_wake_up+0x10/0x10\n ? _raw_spin_unlock_irq+0x24/0x50\n ? rcu_is_watching+0x11/0xb0\n process_one_work+0x8c1/0x1430\n ? __pfx_lock_acquire+0x10/0x10\n ? __pfx_process_one_work+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n ? _raw_spin_lock_irq+0x52/0x60\n worker_thread+0x100/0x12c0\n ? __kthread_parkme+0xc1/0x1f0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x2ea/0x3c0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nOn the zoned mode, writing to pre-allocated region means data relocation\nwrite. Such write always uses WRITE command so there is no need of splitting\nand rewriting logical address. Thus, we can just skip the function for the\ncase.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54080",
"url": "https://www.suse.com/security/cve/CVE-2023-54080"
},
{
"category": "external",
"summary": "SUSE Bug 1256367 for CVE-2023-54080",
"url": "https://bugzilla.suse.com/1256367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54080"
},
{
"cve": "CVE-2023-54081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen: speed up grant-table reclaim\n\nWhen a grant entry is still in use by the remote domain, Linux must put\nit on a deferred list. Normally, this list is very short, because\nthe PV network and block protocols expect the backend to unmap the grant\nfirst. However, Qubes OS\u0027s GUI protocol is subject to the constraints\nof the X Window System, and as such winds up with the frontend unmapping\nthe window first. As a result, the list can grow very large, resulting\nin a massive memory leak and eventual VM freeze.\n\nTo partially solve this problem, make the number of entries that the VM\nwill attempt to free at each iteration tunable. The default is still\n10, but it can be overridden via a module parameter.\n\nThis is Cc: stable because (when combined with appropriate userspace\nchanges) it fixes a severe performance and stability problem for Qubes\nOS users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54081",
"url": "https://www.suse.com/security/cve/CVE-2023-54081"
},
{
"category": "external",
"summary": "SUSE Bug 1256361 for CVE-2023-54081",
"url": "https://bugzilla.suse.com/1256361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54081"
},
{
"cve": "CVE-2023-54083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: tegra: xusb: Clear the driver reference in usb-phy dev\n\nFor the dual-role port, it will assign the phy dev to usb-phy dev and\nuse the port dev driver as the dev driver of usb-phy.\n\nWhen we try to destroy the port dev, it will destroy its dev driver\nas well. But we did not remove the reference from usb-phy dev. This\nmight cause the use-after-free issue in KASAN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54083",
"url": "https://www.suse.com/security/cve/CVE-2023-54083"
},
{
"category": "external",
"summary": "SUSE Bug 1256368 for CVE-2023-54083",
"url": "https://bugzilla.suse.com/1256368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54083"
},
{
"cve": "CVE-2023-54088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: hold queue_lock when removing blkg-\u003eq_node\n\nWhen blkg is removed from q-\u003eblkg_list from blkg_free_workfn(), queue_lock\nhas to be held, otherwise, all kinds of bugs(list corruption, hard lockup,\n..) can be triggered from blkg_destroy_all().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54088",
"url": "https://www.suse.com/security/cve/CVE-2023-54088"
},
{
"category": "external",
"summary": "SUSE Bug 1256263 for CVE-2023-54088",
"url": "https://bugzilla.suse.com/1256263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54088"
},
{
"cve": "CVE-2023-54089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_pmem: add the missing REQ_OP_WRITE for flush bio\n\nWhen doing mkfs.xfs on a pmem device, the following warning was\n\n ------------[ cut here ]------------\n WARNING: CPU: 2 PID: 384 at block/blk-core.c:751 submit_bio_noacct\n Modules linked in:\n CPU: 2 PID: 384 Comm: mkfs.xfs Not tainted 6.4.0-rc7+ #154\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n RIP: 0010:submit_bio_noacct+0x340/0x520\n ......\n Call Trace:\n \u003cTASK\u003e\n ? submit_bio_noacct+0xd5/0x520\n submit_bio+0x37/0x60\n async_pmem_flush+0x79/0xa0\n nvdimm_flush+0x17/0x40\n pmem_submit_bio+0x370/0x390\n __submit_bio+0xbc/0x190\n submit_bio_noacct_nocheck+0x14d/0x370\n submit_bio_noacct+0x1ef/0x520\n submit_bio+0x55/0x60\n submit_bio_wait+0x5a/0xc0\n blkdev_issue_flush+0x44/0x60\n\nThe root cause is that submit_bio_noacct() needs bio_op() is either\nWRITE or ZONE_APPEND for flush bio and async_pmem_flush() doesn\u0027t assign\nREQ_OP_WRITE when allocating flush bio, so submit_bio_noacct just fail\nthe flush bio.\n\nSimply fix it by adding the missing REQ_OP_WRITE for flush bio. And we\ncould fix the flush order issue and do flush optimization later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54089",
"url": "https://www.suse.com/security/cve/CVE-2023-54089"
},
{
"category": "external",
"summary": "SUSE Bug 1256268 for CVE-2023-54089",
"url": "https://bugzilla.suse.com/1256268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54089"
},
{
"cve": "CVE-2023-54091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fix memory leak in drm_client_target_cloned\n\ndmt_mode is allocated and never freed in this function.\nIt was found with the ast driver, but most drivers using generic fbdev\nsetup are probably affected.\n\nThis fixes the following kmemleak report:\n backtrace:\n [\u003c00000000b391296d\u003e] drm_mode_duplicate+0x45/0x220 [drm]\n [\u003c00000000e45bb5b3\u003e] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm]\n [\u003c00000000ed2d3a37\u003e] drm_client_modeset_probe+0x6bd/0xf50 [drm]\n [\u003c0000000010e5cc9d\u003e] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]\n [\u003c00000000909f82ca\u003e] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]\n [\u003c00000000063a69aa\u003e] drm_client_register+0x169/0x240 [drm]\n [\u003c00000000a8c61525\u003e] ast_pci_probe+0x142/0x190 [ast]\n [\u003c00000000987f19bb\u003e] local_pci_probe+0xdc/0x180\n [\u003c000000004fca231b\u003e] work_for_cpu_fn+0x4e/0xa0\n [\u003c0000000000b85301\u003e] process_one_work+0x8b7/0x1540\n [\u003c000000003375b17c\u003e] worker_thread+0x70a/0xed0\n [\u003c00000000b0d43cd9\u003e] kthread+0x29f/0x340\n [\u003c000000008d770833\u003e] ret_from_fork+0x1f/0x30\nunreferenced object 0xff11000333089a00 (size 128):",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54091",
"url": "https://www.suse.com/security/cve/CVE-2023-54091"
},
{
"category": "external",
"summary": "SUSE Bug 1256274 for CVE-2023-54091",
"url": "https://bugzilla.suse.com/1256274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54092"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: pv: fix index value of replaced ASCE\n\nThe index field of the struct page corresponding to a guest ASCE should\nbe 0. When replacing the ASCE in s390_replace_asce(), the index of the\nnew ASCE should also be set to 0.\n\nHaving the wrong index might lead to the wrong addresses being passed\naround when notifying pte invalidations, and eventually to validity\nintercepts (VM crash) if the prefix gets unmapped and the notifier gets\ncalled with the wrong address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54092",
"url": "https://www.suse.com/security/cve/CVE-2023-54092"
},
{
"category": "external",
"summary": "SUSE Bug 1256370 for CVE-2023-54092",
"url": "https://bugzilla.suse.com/1256370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54092"
},
{
"cve": "CVE-2023-54093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: anysee: fix null-ptr-deref in anysee_master_xfer\n\nIn anysee_master_xfer, msg is controlled by user. When msg[i].buf\nis null and msg[i].len is zero, former checks on msg[i].buf would be\npassed. Malicious data finally reach anysee_master_xfer. If accessing\nmsg[i].buf[0] without sanity check, null ptr deref would happen.\nWe add check on msg[i].len to prevent crash.\n\nSimilar commit:\ncommit 0ed554fd769a\n(\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")\n\n[hverkuil: add spaces around +]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54093",
"url": "https://www.suse.com/security/cve/CVE-2023-54093"
},
{
"category": "external",
"summary": "SUSE Bug 1256273 for CVE-2023-54093",
"url": "https://bugzilla.suse.com/1256273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54093"
},
{
"cve": "CVE-2023-54094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent skb corruption on frag list segmentation\n\nIan reported several skb corruptions triggered by rx-gro-list,\ncollecting different oops alike:\n\n[ 62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0\n[ 62.631083] #PF: supervisor read access in kernel mode\n[ 62.636312] #PF: error_code(0x0000) - not-present page\n[ 62.641541] PGD 0 P4D 0\n[ 62.644174] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 62.648629] CPU: 1 PID: 913 Comm: napi/eno2-79 Not tainted 6.4.0 #364\n[ 62.655162] Hardware name: Supermicro Super Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022\n[ 62.663344] RIP: 0010:__udp_gso_segment (./include/linux/skbuff.h:2858\n./include/linux/udp.h:23 net/ipv4/udp_offload.c:228 net/ipv4/udp_offload.c:261\nnet/ipv4/udp_offload.c:277)\n[ 62.687193] RSP: 0018:ffffbd3a83b4f868 EFLAGS: 00010246\n[ 62.692515] RAX: 00000000000000ce RBX: 0000000000000000 RCX: 0000000000000000\n[ 62.699743] RDX: ffffa124def8a000 RSI: 0000000000000079 RDI: ffffa125952a14d4\n[ 62.706970] RBP: ffffa124def8a000 R08: 0000000000000022 R09: 00002000001558c9\n[ 62.714199] R10: 0000000000000000 R11: 00000000be554639 R12: 00000000000000e2\n[ 62.721426] R13: ffffa125952a1400 R14: ffffa125952a1400 R15: 00002000001558c9\n[ 62.728654] FS: 0000000000000000(0000) GS:ffffa127efa40000(0000)\nknlGS:0000000000000000\n[ 62.736852] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 62.742702] CR2: 00000000000000c0 CR3: 00000001034b0000 CR4: 00000000003526e0\n[ 62.749948] Call Trace:\n[ 62.752498] \u003cTASK\u003e\n[ 62.779267] inet_gso_segment (net/ipv4/af_inet.c:1398)\n[ 62.787605] skb_mac_gso_segment (net/core/gro.c:141)\n[ 62.791906] __skb_gso_segment (net/core/dev.c:3403 (discriminator 2))\n[ 62.800492] validate_xmit_skb (./include/linux/netdevice.h:4862\nnet/core/dev.c:3659)\n[ 62.804695] validate_xmit_skb_list (net/core/dev.c:3710)\n[ 62.809158] sch_direct_xmit (net/sched/sch_generic.c:330)\n[ 62.813198] __dev_queue_xmit (net/core/dev.c:3805 net/core/dev.c:4210)\nnet/netfilter/core.c:626)\n[ 62.821093] br_dev_queue_push_xmit (net/bridge/br_forward.c:55)\n[ 62.825652] maybe_deliver (net/bridge/br_forward.c:193)\n[ 62.829420] br_flood (net/bridge/br_forward.c:233)\n[ 62.832758] br_handle_frame_finish (net/bridge/br_input.c:215)\n[ 62.837403] br_handle_frame (net/bridge/br_input.c:298\nnet/bridge/br_input.c:416)\n[ 62.851417] __netif_receive_skb_core.constprop.0 (net/core/dev.c:5387)\n[ 62.866114] __netif_receive_skb_list_core (net/core/dev.c:5570)\n[ 62.871367] netif_receive_skb_list_internal (net/core/dev.c:5638\nnet/core/dev.c:5727)\n[ 62.876795] napi_complete_done (./include/linux/list.h:37\n./include/net/gro.h:434 ./include/net/gro.h:429 net/core/dev.c:6067)\n[ 62.881004] ixgbe_poll (drivers/net/ethernet/intel/ixgbe/ixgbe_main.c:3191)\n[ 62.893534] __napi_poll (net/core/dev.c:6498)\n[ 62.897133] napi_threaded_poll (./include/linux/netpoll.h:89\nnet/core/dev.c:6640)\n[ 62.905276] kthread (kernel/kthread.c:379)\n[ 62.913435] ret_from_fork (arch/x86/entry/entry_64.S:314)\n[ 62.917119] \u003c/TASK\u003e\n\nIn the critical scenario, rx-gro-list GRO-ed packets are fed, via a\nbridge, both to the local input path and to an egress device (tun).\n\nThe segmentation of such packets unsafely writes to the cloned skbs\nwith shared heads.\n\nThis change addresses the issue by uncloning as needed the\nto-be-segmented skbs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54094",
"url": "https://www.suse.com/security/cve/CVE-2023-54094"
},
{
"category": "external",
"summary": "SUSE Bug 1256292 for CVE-2023-54094",
"url": "https://bugzilla.suse.com/1256292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54094"
},
{
"cve": "CVE-2023-54095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: Fix notifiers being shared by PCI and VIO buses\n\nfail_iommu_setup() registers the fail_iommu_bus_notifier struct to both\nPCI and VIO buses. struct notifier_block is a linked list node, so this\ncauses any notifiers later registered to either bus type to also be\nregistered to the other since they share the same node.\n\nThis causes issues in (at least) the vgaarb code, which registers a\nnotifier for PCI buses. pci_notify() ends up being called on a vio\ndevice, converted with to_pci_dev() even though it\u0027s not a PCI device,\nand finally makes a bad access in vga_arbiter_add_pci_device() as\ndiscovered with KASAN:\n\n BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00\n Read of size 4 at addr c000000264c26fdc by task swapper/0/1\n\n Call Trace:\n dump_stack_lvl+0x1bc/0x2b8 (unreliable)\n print_report+0x3f4/0xc60\n kasan_report+0x244/0x698\n __asan_load4+0xe8/0x250\n vga_arbiter_add_pci_device+0x60/0xe00\n pci_notify+0x88/0x444\n notifier_call_chain+0x104/0x320\n blocking_notifier_call_chain+0xa0/0x140\n device_add+0xac8/0x1d30\n device_register+0x58/0x80\n vio_register_device_node+0x9ac/0xce0\n vio_bus_scan_register_devices+0xc4/0x13c\n __machine_initcall_pseries_vio_device_init+0x94/0xf0\n do_one_initcall+0x12c/0xaa8\n kernel_init_freeable+0xa48/0xba8\n kernel_init+0x64/0x400\n ret_from_kernel_thread+0x5c/0x64\n\nFix this by creating separate notifier_block structs for each bus type.\n\n[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54095",
"url": "https://www.suse.com/security/cve/CVE-2023-54095"
},
{
"category": "external",
"summary": "SUSE Bug 1256271 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "external",
"summary": "SUSE Bug 1256272 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoundwire: fix enumeration completion\n\nThe soundwire subsystem uses two completion structures that allow\ndrivers to wait for soundwire device to become enumerated on the bus and\ninitialised by their drivers, respectively.\n\nThe code implementing the signalling is currently broken as it does not\nsignal all current and future waiters and also uses the wrong\nreinitialisation function, which can potentially lead to memory\ncorruption if there are still waiters on the queue.\n\nNot signalling future waiters specifically breaks sound card probe\ndeferrals as codec drivers can not tell that the soundwire device is\nalready attached when being reprobed. Some codec runtime PM\nimplementations suffer from similar problems as waiting for enumeration\nduring resume can also timeout despite the device already having been\nenumerated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54096",
"url": "https://www.suse.com/security/cve/CVE-2023-54096"
},
{
"category": "external",
"summary": "SUSE Bug 1256178 for CVE-2023-54096",
"url": "https://bugzilla.suse.com/1256178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54096"
},
{
"cve": "CVE-2023-54099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Protect reconfiguration of sb read-write from racing writes\n\nThe reconfigure / remount code takes a lot of effort to protect\nfilesystem\u0027s reconfiguration code from racing writes on remounting\nread-only. However during remounting read-only filesystem to read-write\nmode userspace writes can start immediately once we clear SB_RDONLY\nflag. This is inconvenient for example for ext4 because we need to do\nsome writes to the filesystem (such as preparation of quota files)\nbefore we can take userspace writes so we are clearing SB_RDONLY flag\nbefore we are fully ready to accept userpace writes and syzbot has found\na way to exploit this [1]. Also as far as I\u0027m reading the code\nthe filesystem remount code was protected from racing writes in the\nlegacy mount path by the mount\u0027s MNT_READONLY flag so this is relatively\nnew problem. It is actually fairly easy to protect remount read-write\nfrom racing writes using sb-\u003es_readonly_remount flag so let\u0027s just do\nthat instead of having to workaround these races in the filesystem code.\n\n[1] https://lore.kernel.org/all/00000000000006a0df05f6667499@google.com/T/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54099",
"url": "https://www.suse.com/security/cve/CVE-2023-54099"
},
{
"category": "external",
"summary": "SUSE Bug 1256197 for CVE-2023-54099",
"url": "https://bugzilla.suse.com/1256197"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54099"
},
{
"cve": "CVE-2023-54101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver: soc: xilinx: use _safe loop iterator to avoid a use after free\n\nThe hash_for_each_possible() loop dereferences \"eve_data\" to get the\nnext item on the list. However the loop frees eve_data so it leads to\na use after free. Use hash_for_each_possible_safe() instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54101",
"url": "https://www.suse.com/security/cve/CVE-2023-54101"
},
{
"category": "external",
"summary": "SUSE Bug 1256153 for CVE-2023-54101",
"url": "https://bugzilla.suse.com/1256153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54101"
},
{
"cve": "CVE-2023-54104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()\n\n\u0027op-cs\u0027 is copied in \u0027fun-\u003emchip_number\u0027 which is used to access the\n\u0027mchip_offsets\u0027 and the \u0027rnb_gpio\u0027 arrays.\nThese arrays have NAND_MAX_CHIPS elements, so the index must be below this\nlimit.\n\nFix the sanity check in order to avoid the NAND_MAX_CHIPS value. This\nwould lead to out-of-bound accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54104",
"url": "https://www.suse.com/security/cve/CVE-2023-54104"
},
{
"category": "external",
"summary": "SUSE Bug 1256145 for CVE-2023-54104",
"url": "https://bugzilla.suse.com/1256145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54104"
},
{
"cve": "CVE-2023-54106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54106"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fix potential memory leak in mlx5e_init_rep_rx\n\nThe memory pointed to by the priv-\u003erx_res pointer is not freed in the error\npath of mlx5e_init_rep_rx, which can lead to a memory leak. Fix by freeing\nthe memory in the error path, thereby making the error path identical to\nmlx5e_cleanup_rep_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54106",
"url": "https://www.suse.com/security/cve/CVE-2023-54106"
},
{
"category": "external",
"summary": "SUSE Bug 1256358 for CVE-2023-54106",
"url": "https://bugzilla.suse.com/1256358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54106"
},
{
"cve": "CVE-2023-54112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: Fix memory leak in error path of kcm_sendmsg()\n\nsyzbot reported a memory leak like below:\n\nBUG: memory leak\nunreferenced object 0xffff88810b088c00 (size 240):\n comm \"syz-executor186\", pid 5012, jiffies 4294943306 (age 13.680s)\n hex dump (first 32 bytes):\n 00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff83e5d5ff\u003e] __alloc_skb+0x1ef/0x230 net/core/skbuff.c:634\n [\u003cffffffff84606e59\u003e] alloc_skb include/linux/skbuff.h:1289 [inline]\n [\u003cffffffff84606e59\u003e] kcm_sendmsg+0x269/0x1050 net/kcm/kcmsock.c:815\n [\u003cffffffff83e479c6\u003e] sock_sendmsg_nosec net/socket.c:725 [inline]\n [\u003cffffffff83e479c6\u003e] sock_sendmsg+0x56/0xb0 net/socket.c:748\n [\u003cffffffff83e47f55\u003e] ____sys_sendmsg+0x365/0x470 net/socket.c:2494\n [\u003cffffffff83e4c389\u003e] ___sys_sendmsg+0xc9/0x130 net/socket.c:2548\n [\u003cffffffff83e4c536\u003e] __sys_sendmsg+0xa6/0x120 net/socket.c:2577\n [\u003cffffffff84ad7bb8\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003cffffffff84ad7bb8\u003e] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\n [\u003cffffffff84c0008b\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nIn kcm_sendmsg(), kcm_tx_msg(head)-\u003elast_skb is used as a cursor to append\nnewly allocated skbs to \u0027head\u0027. If some bytes are copied, an error occurred,\nand jumped to out_error label, \u0027last_skb\u0027 is left unmodified. A later\nkcm_sendmsg() will use an obsoleted \u0027last_skb\u0027 reference, corrupting the\n\u0027head\u0027 frag_list and causing the leak.\n\nThis patch fixes this issue by properly updating the last allocated skb in\n\u0027last_skb\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54112",
"url": "https://www.suse.com/security/cve/CVE-2023-54112"
},
{
"category": "external",
"summary": "SUSE Bug 1256354 for CVE-2023-54112",
"url": "https://bugzilla.suse.com/1256354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54112"
},
{
"cve": "CVE-2023-54113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrcu: dump vmalloc memory info safely\n\nCurrently, for double invoke call_rcu(), will dump rcu_head objects memory\ninfo, if the objects is not allocated from the slab allocator, the\nvmalloc_dump_obj() will be invoke and the vmap_area_lock spinlock need to\nbe held, since the call_rcu() can be invoked in interrupt context,\ntherefore, there is a possibility of spinlock deadlock scenarios.\n\nAnd in Preempt-RT kernel, the rcutorture test also trigger the following\nlockdep warning:\n\nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1, name: swapper/0\npreempt_count: 1, expected: 0\nRCU nest depth: 1, expected: 1\n3 locks held by swapper/0/1:\n #0: ffffffffb534ee80 (fullstop_mutex){+.+.}-{4:4}, at: torture_init_begin+0x24/0xa0\n #1: ffffffffb5307940 (rcu_read_lock){....}-{1:3}, at: rcu_torture_init+0x1ec7/0x2370\n #2: ffffffffb536af40 (vmap_area_lock){+.+.}-{3:3}, at: find_vmap_area+0x1f/0x70\nirq event stamp: 565512\nhardirqs last enabled at (565511): [\u003cffffffffb379b138\u003e] __call_rcu_common+0x218/0x940\nhardirqs last disabled at (565512): [\u003cffffffffb5804262\u003e] rcu_torture_init+0x20b2/0x2370\nsoftirqs last enabled at (399112): [\u003cffffffffb36b2586\u003e] __local_bh_enable_ip+0x126/0x170\nsoftirqs last disabled at (399106): [\u003cffffffffb43fef59\u003e] inet_register_protosw+0x9/0x1d0\nPreemption disabled at:\n[\u003cffffffffb58040c3\u003e] rcu_torture_init+0x1f13/0x2370\nCPU: 0 PID: 1 Comm: swapper/0 Tainted: G W 6.5.0-rc4-rt2-yocto-preempt-rt+ #15\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x68/0xb0\n dump_stack+0x14/0x20\n __might_resched+0x1aa/0x280\n ? __pfx_rcu_torture_err_cb+0x10/0x10\n rt_spin_lock+0x53/0x130\n ? find_vmap_area+0x1f/0x70\n find_vmap_area+0x1f/0x70\n vmalloc_dump_obj+0x20/0x60\n mem_dump_obj+0x22/0x90\n __call_rcu_common+0x5bf/0x940\n ? debug_smp_processor_id+0x1b/0x30\n call_rcu_hurry+0x14/0x20\n rcu_torture_init+0x1f82/0x2370\n ? __pfx_rcu_torture_leak_cb+0x10/0x10\n ? __pfx_rcu_torture_leak_cb+0x10/0x10\n ? __pfx_rcu_torture_init+0x10/0x10\n do_one_initcall+0x6c/0x300\n ? debug_smp_processor_id+0x1b/0x30\n kernel_init_freeable+0x2b9/0x540\n ? __pfx_kernel_init+0x10/0x10\n kernel_init+0x1f/0x150\n ret_from_fork+0x40/0x50\n ? __pfx_kernel_init+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nThe previous patch fixes this by using the deadlock-safe best-effort\nversion of find_vm_area. However, in case of failure print the fact that\nthe pointer was a vmalloc pointer so that we print at least something.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54113",
"url": "https://www.suse.com/security/cve/CVE-2023-54113"
},
{
"category": "external",
"summary": "SUSE Bug 1256351 for CVE-2023-54113",
"url": "https://bugzilla.suse.com/1256351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54113"
},
{
"cve": "CVE-2023-54115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()\n\nWhen nonstatic_release_resource_db() frees all resources associated\nwith an PCMCIA socket, it forgets to free socket_data too, causing\na memory leak observable with kmemleak:\n\nunreferenced object 0xc28d1000 (size 64):\n comm \"systemd-udevd\", pid 297, jiffies 4294898478 (age 194.484s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 f0 85 0e c3 00 00 00 00 ................\n 00 00 00 00 0c 10 8d c2 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffda4245\u003e] __kmem_cache_alloc_node+0x2d7/0x4a0\n [\u003c7e51f0c8\u003e] kmalloc_trace+0x31/0xa4\n [\u003cd52b4ca0\u003e] nonstatic_init+0x24/0x1a4 [pcmcia_rsrc]\n [\u003ca2f13e08\u003e] pcmcia_register_socket+0x200/0x35c [pcmcia_core]\n [\u003ca728be1b\u003e] yenta_probe+0x4d8/0xa70 [yenta_socket]\n [\u003cc48fac39\u003e] pci_device_probe+0x99/0x194\n [\u003c84b7c690\u003e] really_probe+0x181/0x45c\n [\u003c8060fe6e\u003e] __driver_probe_device+0x75/0x1f4\n [\u003cb9b76f43\u003e] driver_probe_device+0x28/0xac\n [\u003c648b766f\u003e] __driver_attach+0xeb/0x1e4\n [\u003c6e9659eb\u003e] bus_for_each_dev+0x61/0xb4\n [\u003c25a669f3\u003e] driver_attach+0x1e/0x28\n [\u003cd8671d6b\u003e] bus_add_driver+0x102/0x20c\n [\u003cdf0d323c\u003e] driver_register+0x5b/0x120\n [\u003c942cd8a4\u003e] __pci_register_driver+0x44/0x4c\n [\u003ce536027e\u003e] __UNIQUE_ID___addressable_cleanup_module188+0x1c/0xfffff000 [iTCO_vendor_support]\n\nFix this by freeing socket_data too.\n\nTested on a Acer Travelmate 4002WLMi by manually binding/unbinding\nthe yenta_cardbus driver (yenta_socket).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54115",
"url": "https://www.suse.com/security/cve/CVE-2023-54115"
},
{
"category": "external",
"summary": "SUSE Bug 1256121 for CVE-2023-54115",
"url": "https://bugzilla.suse.com/1256121"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54115"
},
{
"cve": "CVE-2023-54117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54117"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dcssblk: fix kernel crash with list_add corruption\n\nCommit fb08a1908cb1 (\"dax: simplify the dax_device \u003c-\u003e gendisk\nassociation\") introduced new logic for gendisk association, requiring\ndrivers to explicitly call dax_add_host() and dax_remove_host().\n\nFor dcssblk driver, some dax_remove_host() calls were missing, e.g. in\ndevice remove path. The commit also broke error handling for out_dax case\nin device add path, resulting in an extra put_device() w/o the previous\nget_device() in that case.\n\nThis lead to stale xarray entries after device add / remove cycles. In the\ncase when a previously used struct gendisk pointer (xarray index) would be\nused again, because blk_alloc_disk() happened to return such a pointer, the\nxa_insert() in dax_add_host() would fail and go to out_dax, doing the extra\nput_device() in the error path. In combination with an already flawed error\nhandling in dcssblk (device_register() cleanup), which needs to be\naddressed in a separate patch, this resulted in a missing device_del() /\nklist_del(), and eventually in the kernel crash with list_add corruption on\na subsequent device_add() / klist_add().\n\nFix this by adding the missing dax_remove_host() calls, and also move the\nput_device() in the error path to restore the previous logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54117",
"url": "https://www.suse.com/security/cve/CVE-2023-54117"
},
{
"category": "external",
"summary": "SUSE Bug 1256348 for CVE-2023-54117",
"url": "https://bugzilla.suse.com/1256348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54117"
},
{
"cve": "CVE-2023-54121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix incorrect splitting in btrfs_drop_extent_map_range\n\nIn production we were seeing a variety of WARN_ON()\u0027s in the extent_map\ncode, specifically in btrfs_drop_extent_map_range() when we have to call\nadd_extent_mapping() for our second split.\n\nConsider the following extent map layout\n\n\tPINNED\n\t[0 16K) [32K, 48K)\n\nand then we call btrfs_drop_extent_map_range for [0, 36K), with\nskip_pinned == true. The initial loop will have\n\n\tstart = 0\n\tend = 36K\n\tlen = 36K\n\nwe will find the [0, 16k) extent, but since we are pinned we will skip\nit, which has this code\n\n\tstart = em_end;\n\tif (end != (u64)-1)\n\t\tlen = start + len - em_end;\n\nem_end here is 16K, so now the values are\n\n\tstart = 16K\n\tlen = 16K + 36K - 16K = 36K\n\nlen should instead be 20K. This is a problem when we find the next\nextent at [32K, 48K), we need to split this extent to leave [36K, 48k),\nhowever the code for the split looks like this\n\n\tsplit-\u003estart = start + len;\n\tsplit-\u003elen = em_end - (start + len);\n\nIn this case we have\n\n\tem_end = 48K\n\tsplit-\u003estart = 16K + 36K // this should be 16K + 20K\n\tsplit-\u003elen = 48K - (16K + 36K) // this overflows as 16K + 36K is 52K\n\nand now we have an invalid extent_map in the tree that potentially\noverlaps other entries in the extent map. Even in the non-overlapping\ncase we will have split-\u003estart set improperly, which will cause problems\nwith any block related calculations.\n\nWe don\u0027t actually need len in this loop, we can simply use end as our\nend point, and only adjust start up when we find a pinned extent we need\nto skip.\n\nAdjust the logic to do this, which keeps us from inserting an invalid\nextent map.\n\nWe only skip_pinned in the relocation case, so this is relatively rare,\nexcept in the case where you are running relocation a lot, which can\nhappen with auto relocation on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54121",
"url": "https://www.suse.com/security/cve/CVE-2023-54121"
},
{
"category": "external",
"summary": "SUSE Bug 1256267 for CVE-2023-54121",
"url": "https://bugzilla.suse.com/1256267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54121"
},
{
"cve": "CVE-2023-54125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Return error for inconsistent extended attributes\n\nntfs_read_ea is called when we want to read extended attributes. There\nare some sanity checks for the validity of the EAs. However, it fails to\nreturn a proper error code for the inconsistent attributes, which might\nlead to unpredicted memory accesses after return.\n\n[ 138.916927] BUG: KASAN: use-after-free in ntfs_set_ea+0x453/0xbf0\n[ 138.923876] Write of size 4 at addr ffff88800205cfac by task poc/199\n[ 138.931132]\n[ 138.933016] CPU: 0 PID: 199 Comm: poc Not tainted 6.2.0-rc1+ #4\n[ 138.938070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n[ 138.947327] Call Trace:\n[ 138.949557] \u003cTASK\u003e\n[ 138.951539] dump_stack_lvl+0x4d/0x67\n[ 138.956834] print_report+0x16f/0x4a6\n[ 138.960798] ? ntfs_set_ea+0x453/0xbf0\n[ 138.964437] ? kasan_complete_mode_report_info+0x7d/0x200\n[ 138.969793] ? ntfs_set_ea+0x453/0xbf0\n[ 138.973523] kasan_report+0xb8/0x140\n[ 138.976740] ? ntfs_set_ea+0x453/0xbf0\n[ 138.980578] __asan_store4+0x76/0xa0\n[ 138.984669] ntfs_set_ea+0x453/0xbf0\n[ 138.988115] ? __pfx_ntfs_set_ea+0x10/0x10\n[ 138.993390] ? kernel_text_address+0xd3/0xe0\n[ 138.998270] ? __kernel_text_address+0x16/0x50\n[ 139.002121] ? unwind_get_return_address+0x3e/0x60\n[ 139.005659] ? __pfx_stack_trace_consume_entry+0x10/0x10\n[ 139.010177] ? arch_stack_walk+0xa2/0x100\n[ 139.013657] ? filter_irq_stacks+0x27/0x80\n[ 139.017018] ntfs_setxattr+0x405/0x440\n[ 139.022151] ? __pfx_ntfs_setxattr+0x10/0x10\n[ 139.026569] ? kvmalloc_node+0x2d/0x120\n[ 139.030329] ? kasan_save_stack+0x41/0x60\n[ 139.033883] ? kasan_save_stack+0x2a/0x60\n[ 139.037338] ? kasan_set_track+0x29/0x40\n[ 139.040163] ? kasan_save_alloc_info+0x1f/0x30\n[ 139.043588] ? __kasan_kmalloc+0x8b/0xa0\n[ 139.047255] ? __kmalloc_node+0x68/0x150\n[ 139.051264] ? kvmalloc_node+0x2d/0x120\n[ 139.055301] ? vmemdup_user+0x2b/0xa0\n[ 139.058584] __vfs_setxattr+0x121/0x170\n[ 139.062617] ? __pfx___vfs_setxattr+0x10/0x10\n[ 139.066282] __vfs_setxattr_noperm+0x97/0x300\n[ 139.070061] __vfs_setxattr_locked+0x145/0x170\n[ 139.073580] vfs_setxattr+0x137/0x2a0\n[ 139.076641] ? __pfx_vfs_setxattr+0x10/0x10\n[ 139.080223] ? __kasan_check_write+0x18/0x20\n[ 139.084234] do_setxattr+0xce/0x150\n[ 139.087768] setxattr+0x126/0x140\n[ 139.091250] ? __pfx_setxattr+0x10/0x10\n[ 139.094948] ? __virt_addr_valid+0xcb/0x140\n[ 139.097838] ? __call_rcu_common.constprop.0+0x1c7/0x330\n[ 139.102688] ? debug_smp_processor_id+0x1b/0x30\n[ 139.105985] ? kasan_quarantine_put+0x5b/0x190\n[ 139.109980] ? putname+0x84/0xa0\n[ 139.113886] ? __kasan_slab_free+0x11e/0x1b0\n[ 139.117961] ? putname+0x84/0xa0\n[ 139.121316] ? preempt_count_sub+0x1c/0xd0\n[ 139.124427] ? __mnt_want_write+0xae/0x100\n[ 139.127836] ? mnt_want_write+0x8f/0x150\n[ 139.130954] path_setxattr+0x164/0x180\n[ 139.133998] ? __pfx_path_setxattr+0x10/0x10\n[ 139.137853] ? __pfx_ksys_pwrite64+0x10/0x10\n[ 139.141299] ? debug_smp_processor_id+0x1b/0x30\n[ 139.145714] ? fpregs_assert_state_consistent+0x6b/0x80\n[ 139.150796] __x64_sys_setxattr+0x71/0x90\n[ 139.155407] do_syscall_64+0x3f/0x90\n[ 139.159035] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n[ 139.163843] RIP: 0033:0x7f108cae4469\n[ 139.166481] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088\n[ 139.183764] RSP: 002b:00007fff87588388 EFLAGS: 00000286 ORIG_RAX: 00000000000000bc\n[ 139.190657] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f108cae4469\n[ 139.196586] RDX: 00007fff875883b0 RSI: 00007fff875883d1 RDI: 00007fff875883b6\n[ 139.201716] RBP: 00007fff8758c530 R08: 0000000000000001 R09: 00007fff8758c618\n[ 139.207940] R10: 0000000000000006 R11: 0000000000000286 R12: 00000000004004c0\n[ 139.214007] R13: 00007fff8758c610 R14: 0000000000000000 R15\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54125",
"url": "https://www.suse.com/security/cve/CVE-2023-54125"
},
{
"category": "external",
"summary": "SUSE Bug 1256117 for CVE-2023-54125",
"url": "https://bugzilla.suse.com/1256117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54125"
},
{
"cve": "CVE-2023-54127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()\n\nSyzkaller reported the following issue:\n==================================================================\nBUG: KASAN: double-free in slab_free mm/slub.c:3787 [inline]\nBUG: KASAN: double-free in __kmem_cache_free+0x71/0x110 mm/slub.c:3800\nFree of addr ffff888086408000 by task syz-executor.4/12750\n[...]\nCall Trace:\n \u003cTASK\u003e\n[...]\n kasan_report_invalid_free+0xac/0xd0 mm/kasan/report.c:482\n ____kasan_slab_free+0xfb/0x120\n kasan_slab_free include/linux/kasan.h:177 [inline]\n slab_free_hook mm/slub.c:1781 [inline]\n slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1807\n slab_free mm/slub.c:3787 [inline]\n __kmem_cache_free+0x71/0x110 mm/slub.c:3800\n dbUnmount+0xf4/0x110 fs/jfs/jfs_dmap.c:264\n jfs_umount+0x248/0x3b0 fs/jfs/jfs_umount.c:87\n jfs_put_super+0x86/0x190 fs/jfs/super.c:194\n generic_shutdown_super+0x130/0x310 fs/super.c:492\n kill_block_super+0x79/0xd0 fs/super.c:1386\n deactivate_locked_super+0xa7/0xf0 fs/super.c:332\n cleanup_mnt+0x494/0x520 fs/namespace.c:1291\n task_work_run+0x243/0x300 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop+0x124/0x150 kernel/entry/common.c:171\n exit_to_user_mode_prepare+0xb2/0x140 kernel/entry/common.c:203\n __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]\n syscall_exit_to_user_mode+0x26/0x60 kernel/entry/common.c:296\n do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[...]\n \u003c/TASK\u003e\n\nAllocated by task 13352:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x3d/0x60 mm/kasan/common.c:52\n ____kasan_kmalloc mm/kasan/common.c:371 [inline]\n __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:380\n kmalloc include/linux/slab.h:580 [inline]\n dbMount+0x54/0x980 fs/jfs/jfs_dmap.c:164\n jfs_mount+0x1dd/0x830 fs/jfs/jfs_mount.c:121\n jfs_fill_super+0x590/0xc50 fs/jfs/super.c:556\n mount_bdev+0x26c/0x3a0 fs/super.c:1359\n legacy_get_tree+0xea/0x180 fs/fs_context.c:610\n vfs_get_tree+0x88/0x270 fs/super.c:1489\n do_new_mount+0x289/0xad0 fs/namespace.c:3145\n do_mount fs/namespace.c:3488 [inline]\n __do_sys_mount fs/namespace.c:3697 [inline]\n __se_sys_mount+0x2d3/0x3c0 fs/namespace.c:3674\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFreed by task 13352:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x3d/0x60 mm/kasan/common.c:52\n kasan_save_free_info+0x27/0x40 mm/kasan/generic.c:518\n ____kasan_slab_free+0xd6/0x120 mm/kasan/common.c:236\n kasan_slab_free include/linux/kasan.h:177 [inline]\n slab_free_hook mm/slub.c:1781 [inline]\n slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1807\n slab_free mm/slub.c:3787 [inline]\n __kmem_cache_free+0x71/0x110 mm/slub.c:3800\n dbUnmount+0xf4/0x110 fs/jfs/jfs_dmap.c:264\n jfs_mount_rw+0x545/0x740 fs/jfs/jfs_mount.c:247\n jfs_remount+0x3db/0x710 fs/jfs/super.c:454\n reconfigure_super+0x3bc/0x7b0 fs/super.c:935\n vfs_fsconfig_locked fs/fsopen.c:254 [inline]\n __do_sys_fsconfig fs/fsopen.c:439 [inline]\n __se_sys_fsconfig+0xad5/0x1060 fs/fsopen.c:314\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[...]\n\nJFS_SBI(ipbmap-\u003ei_sb)-\u003ebmap wasn\u0027t set to NULL after kfree() in\ndbUnmount().\n\nSyzkaller uses faultinject to reproduce this KASAN double-free\nwarning. The issue is triggered if either diMount() or dbMount() fail\nin jfs_remount(), since diUnmount() or dbUnmount() already happened in\nsuch a case - they will do double-free on next execution: jfs_umount\nor jfs_remount.\n\nTested on both upstream and jfs-next by syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54127",
"url": "https://www.suse.com/security/cve/CVE-2023-54127"
},
{
"category": "external",
"summary": "SUSE Bug 1256119 for CVE-2023-54127",
"url": "https://bugzilla.suse.com/1256119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54127"
},
{
"cve": "CVE-2023-54133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: clean mc addresses in application firmware when closing port\n\nWhen moving devices from one namespace to another, mc addresses are\ncleaned in software while not removed from application firmware. Thus\nthe mc addresses are remained and will cause resource leak.\n\nNow use `__dev_mc_unsync` to clean mc addresses when closing port.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54133",
"url": "https://www.suse.com/security/cve/CVE-2023-54133"
},
{
"category": "external",
"summary": "SUSE Bug 1256104 for CVE-2023-54133",
"url": "https://bugzilla.suse.com/1256104"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54133"
},
{
"cve": "CVE-2023-54134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nautofs: fix memory leak of waitqueues in autofs_catatonic_mode\n\nSyzkaller reports a memory leak:\n\nBUG: memory leak\nunreferenced object 0xffff88810b279e00 (size 96):\n comm \"syz-executor399\", pid 3631, jiffies 4294964921 (age 23.870s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 08 9e 27 0b 81 88 ff ff ..........\u0027.....\n 08 9e 27 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ..\u0027.............\n backtrace:\n [\u003cffffffff814cfc90\u003e] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046\n [\u003cffffffff81bb75ca\u003e] kmalloc include/linux/slab.h:576 [inline]\n [\u003cffffffff81bb75ca\u003e] autofs_wait+0x3fa/0x9a0 fs/autofs/waitq.c:378\n [\u003cffffffff81bb88a7\u003e] autofs_do_expire_multi+0xa7/0x3e0 fs/autofs/expire.c:593\n [\u003cffffffff81bb8c33\u003e] autofs_expire_multi+0x53/0x80 fs/autofs/expire.c:619\n [\u003cffffffff81bb6972\u003e] autofs_root_ioctl_unlocked+0x322/0x3b0 fs/autofs/root.c:897\n [\u003cffffffff81bb6a95\u003e] autofs_root_ioctl+0x25/0x30 fs/autofs/root.c:910\n [\u003cffffffff81602a9c\u003e] vfs_ioctl fs/ioctl.c:51 [inline]\n [\u003cffffffff81602a9c\u003e] __do_sys_ioctl fs/ioctl.c:870 [inline]\n [\u003cffffffff81602a9c\u003e] __se_sys_ioctl fs/ioctl.c:856 [inline]\n [\u003cffffffff81602a9c\u003e] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:856\n [\u003cffffffff84608225\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003cffffffff84608225\u003e] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n [\u003cffffffff84800087\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nautofs_wait_queue structs should be freed if their wait_ctr becomes zero.\nOtherwise they will be lost.\n\nIn this case an AUTOFS_IOC_EXPIRE_MULTI ioctl is done, then a new\nwaitqueue struct is allocated in autofs_wait(), its initial wait_ctr\nequals 2. After that wait_event_killable() is interrupted (it returns\n-ERESTARTSYS), so that \u0027wq-\u003ename.name == NULL\u0027 condition may be not\nsatisfied. Actually, this condition can be satisfied when\nautofs_wait_release() or autofs_catatonic_mode() is called and, what is\nalso important, wait_ctr is decremented in those places. Upon the exit of\nautofs_wait(), wait_ctr is decremented to 1. Then the unmounting process\nbegins: kill_sb calls autofs_catatonic_mode(), which should have freed the\nwaitqueues, but it only decrements its usage counter to zero which is not\na correct behaviour.\n\nedit:imk\nThis description is of course not correct. The umount performed as a result\nof an expire is a umount of a mount that has been automounted, it\u0027s not the\nautofs mount itself. They happen independently, usually after everything\nmounted within the autofs file system has been expired away. If everything\nhasn\u0027t been expired away the automount daemon can still exit leaving mounts\nin place. But expires done in both cases will result in a notification that\ncalls autofs_wait_release() with a result status. The problem case is the\nsummary execution of of the automount daemon. In this case any waiting\nprocesses won\u0027t be woken up until either they are terminated or the mount\nis umounted.\nend edit: imk\n\nSo in catatonic mode we should free waitqueues which counter becomes zero.\n\nedit: imk\nInitially I was concerned that the calling of autofs_wait_release() and\nautofs_catatonic_mode() was not mutually exclusive but that can\u0027t be the\ncase (obviously) because the queue entry (or entries) is removed from the\nlist when either of these two functions are called. Consequently the wait\nentry will be freed by only one of these functions or by the woken process\nin autofs_wait() depending on the order of the calls.\nend edit: imk",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54134",
"url": "https://www.suse.com/security/cve/CVE-2023-54134"
},
{
"category": "external",
"summary": "SUSE Bug 1256106 for CVE-2023-54134",
"url": "https://bugzilla.suse.com/1256106"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54134"
},
{
"cve": "CVE-2023-54135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmaple_tree: fix potential out-of-bounds access in mas_wr_end_piv()\n\nCheck the write offset end bounds before using it as the offset into the\npivot array. This avoids a possible out-of-bounds access on the pivot\narray if the write extends to the last slot in the node, in which case the\nnode maximum should be used as the end pivot.\n\nakpm: this doesn\u0027t affect any current callers, but new users of mapletree\nmay encounter this problem if backported into earlier kernels, so let\u0027s\nfix it in -stable kernels in case of this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54135",
"url": "https://www.suse.com/security/cve/CVE-2023-54135"
},
{
"category": "external",
"summary": "SUSE Bug 1256107 for CVE-2023-54135",
"url": "https://bugzilla.suse.com/1256107"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54135"
},
{
"cve": "CVE-2023-54136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sprd: Fix DMA buffer leak issue\n\nRelease DMA buffer when _probe() returns failure to avoid memory leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54136",
"url": "https://www.suse.com/security/cve/CVE-2023-54136"
},
{
"category": "external",
"summary": "SUSE Bug 1256099 for CVE-2023-54136",
"url": "https://bugzilla.suse.com/1256099"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54136"
},
{
"cve": "CVE-2023-54137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54137"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/type1: fix cap_migration information leak\n\nFix an information leak where an uninitialized hole in struct\nvfio_iommu_type1_info_cap_migration on the stack is exposed to userspace.\n\nThe definition of struct vfio_iommu_type1_info_cap_migration contains a hole as\nshown in this pahole(1) output:\n\n struct vfio_iommu_type1_info_cap_migration {\n struct vfio_info_cap_header header; /* 0 8 */\n __u32 flags; /* 8 4 */\n\n /* XXX 4 bytes hole, try to pack */\n\n __u64 pgsize_bitmap; /* 16 8 */\n __u64 max_dirty_bitmap_size; /* 24 8 */\n\n /* size: 32, cachelines: 1, members: 4 */\n /* sum members: 28, holes: 1, sum holes: 4 */\n /* last cacheline: 32 bytes */\n };\n\nThe cap_mig variable is filled in without initializing the hole:\n\n static int vfio_iommu_migration_build_caps(struct vfio_iommu *iommu,\n struct vfio_info_cap *caps)\n {\n struct vfio_iommu_type1_info_cap_migration cap_mig;\n\n cap_mig.header.id = VFIO_IOMMU_TYPE1_INFO_CAP_MIGRATION;\n cap_mig.header.version = 1;\n\n cap_mig.flags = 0;\n /* support minimum pgsize */\n cap_mig.pgsize_bitmap = (size_t)1 \u003c\u003c __ffs(iommu-\u003epgsize_bitmap);\n cap_mig.max_dirty_bitmap_size = DIRTY_BITMAP_SIZE_MAX;\n\n return vfio_info_add_capability(caps, \u0026cap_mig.header, sizeof(cap_mig));\n }\n\nThe structure is then copied to a temporary location on the heap. At this point\nit\u0027s already too late and ioctl(VFIO_IOMMU_GET_INFO) copies it to userspace\nlater:\n\n int vfio_info_add_capability(struct vfio_info_cap *caps,\n struct vfio_info_cap_header *cap, size_t size)\n {\n struct vfio_info_cap_header *header;\n\n header = vfio_info_cap_add(caps, size, cap-\u003eid, cap-\u003eversion);\n if (IS_ERR(header))\n return PTR_ERR(header);\n\n memcpy(header + 1, cap + 1, size - sizeof(*header));\n\n return 0;\n }\n\nThis issue was found by code inspection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54137",
"url": "https://www.suse.com/security/cve/CVE-2023-54137"
},
{
"category": "external",
"summary": "SUSE Bug 1256100 for CVE-2023-54137",
"url": "https://bugzilla.suse.com/1256100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54137"
},
{
"cve": "CVE-2023-54140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse\n\nA syzbot stress test using a corrupted disk image reported that\nmark_buffer_dirty() called from __nilfs_mark_inode_dirty() or\nnilfs_palloc_commit_alloc_entry() may output a kernel warning, and can\npanic if the kernel is booted with panic_on_warn.\n\nThis is because nilfs2 keeps buffer pointers in local structures for some\nmetadata and reuses them, but such buffers may be forcibly discarded by\nnilfs_clear_dirty_page() in some critical situations.\n\nThis issue is reported to appear after commit 28a65b49eb53 (\"nilfs2: do\nnot write dirty data after degenerating to read-only\"), but the issue has\npotentially existed before.\n\nFix this issue by checking the uptodate flag when attempting to reuse an\ninternally held buffer, and reloading the metadata instead of reusing the\nbuffer if the flag was lost.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54140",
"url": "https://www.suse.com/security/cve/CVE-2023-54140"
},
{
"category": "external",
"summary": "SUSE Bug 1256093 for CVE-2023-54140",
"url": "https://bugzilla.suse.com/1256093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54140"
},
{
"cve": "CVE-2023-54141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: Add missing hw_ops-\u003eget_ring_selector() for IPQ5018\n\nDuring sending data after clients connected, hw_ops-\u003eget_ring_selector()\nwill be called. But for IPQ5018, this member isn\u0027t set, and the\nfollowing NULL pointer exception will be occurred:\n\n\t[ 38.840478] 8\u003c--- cut here ---\n\t[ 38.840517] Unable to handle kernel NULL pointer dereference at virtual address 00000000\n\t...\n\t[ 38.923161] PC is at 0x0\n\t[ 38.927930] LR is at ath11k_dp_tx+0x70/0x730 [ath11k]\n\t...\n\t[ 39.063264] Process hostapd (pid: 1034, stack limit = 0x801ceb3d)\n\t[ 39.068994] Stack: (0x856a9a68 to 0x856aa000)\n\t...\n\t[ 39.438467] [\u003c7f323804\u003e] (ath11k_dp_tx [ath11k]) from [\u003c7f314e6c\u003e] (ath11k_mac_op_tx+0x80/0x190 [ath11k])\n\t[ 39.446607] [\u003c7f314e6c\u003e] (ath11k_mac_op_tx [ath11k]) from [\u003c7f17dbe0\u003e] (ieee80211_handle_wake_tx_queue+0x7c/0xc0 [mac80211])\n\t[ 39.456162] [\u003c7f17dbe0\u003e] (ieee80211_handle_wake_tx_queue [mac80211]) from [\u003c7f174450\u003e] (ieee80211_probereq_get+0x584/0x704 [mac80211])\n\t[ 39.467443] [\u003c7f174450\u003e] (ieee80211_probereq_get [mac80211]) from [\u003c7f178c40\u003e] (ieee80211_tx_prepare_skb+0x1f8/0x248 [mac80211])\n\t[ 39.479334] [\u003c7f178c40\u003e] (ieee80211_tx_prepare_skb [mac80211]) from [\u003c7f179e28\u003e] (__ieee80211_subif_start_xmit+0x32c/0x3d4 [mac80211])\n\t[ 39.491053] [\u003c7f179e28\u003e] (__ieee80211_subif_start_xmit [mac80211]) from [\u003c7f17af08\u003e] (ieee80211_tx_control_port+0x19c/0x288 [mac80211])\n\t[ 39.502946] [\u003c7f17af08\u003e] (ieee80211_tx_control_port [mac80211]) from [\u003c7f0fc704\u003e] (nl80211_tx_control_port+0x174/0x1d4 [cfg80211])\n\t[ 39.515017] [\u003c7f0fc704\u003e] (nl80211_tx_control_port [cfg80211]) from [\u003c808ceac4\u003e] (genl_rcv_msg+0x154/0x340)\n\t[ 39.526814] [\u003c808ceac4\u003e] (genl_rcv_msg) from [\u003c808cdb74\u003e] (netlink_rcv_skb+0xb8/0x11c)\n\t[ 39.536446] [\u003c808cdb74\u003e] (netlink_rcv_skb) from [\u003c808ce1d0\u003e] (genl_rcv+0x28/0x34)\n\t[ 39.544344] [\u003c808ce1d0\u003e] (genl_rcv) from [\u003c808cd234\u003e] (netlink_unicast+0x174/0x274)\n\t[ 39.551895] [\u003c808cd234\u003e] (netlink_unicast) from [\u003c808cd510\u003e] (netlink_sendmsg+0x1dc/0x440)\n\t[ 39.559362] [\u003c808cd510\u003e] (netlink_sendmsg) from [\u003c808596e0\u003e] (____sys_sendmsg+0x1a8/0x1fc)\n\t[ 39.567697] [\u003c808596e0\u003e] (____sys_sendmsg) from [\u003c8085b1a8\u003e] (___sys_sendmsg+0xa4/0xdc)\n\t[ 39.575941] [\u003c8085b1a8\u003e] (___sys_sendmsg) from [\u003c8085b310\u003e] (sys_sendmsg+0x44/0x74)\n\t[ 39.583841] [\u003c8085b310\u003e] (sys_sendmsg) from [\u003c80300060\u003e] (ret_fast_syscall+0x0/0x40)\n\t...\n\t[ 39.620734] Code: bad PC value\n\t[ 39.625869] ---[ end trace 8aef983ad3cbc032 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54141",
"url": "https://www.suse.com/security/cve/CVE-2023-54141"
},
{
"category": "external",
"summary": "SUSE Bug 1256094 for CVE-2023-54141",
"url": "https://bugzilla.suse.com/1256094"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54141"
},
{
"cve": "CVE-2023-54142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: Fix use-after-free in __gtp_encap_destroy().\n\nsyzkaller reported use-after-free in __gtp_encap_destroy(). [0]\n\nIt shows the same process freed sk and touched it illegally.\n\nCommit e198987e7dd7 (\"gtp: fix suspicious RCU usage\") added lock_sock()\nand release_sock() in __gtp_encap_destroy() to protect sk-\u003esk_user_data,\nbut release_sock() is called after sock_put() releases the last refcnt.\n\n[0]:\nBUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]\nBUG: KASAN: slab-use-after-free in atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]\nBUG: KASAN: slab-use-after-free in queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]\nBUG: KASAN: slab-use-after-free in do_raw_spin_lock include/linux/spinlock.h:186 [inline]\nBUG: KASAN: slab-use-after-free in __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]\nBUG: KASAN: slab-use-after-free in _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178\nWrite of size 4 at addr ffff88800dbef398 by task syz-executor.2/2401\n\nCPU: 1 PID: 2401 Comm: syz-executor.2 Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:351 [inline]\n print_report+0xcc/0x620 mm/kasan/report.c:462\n kasan_report+0xb2/0xe0 mm/kasan/report.c:572\n check_region_inline mm/kasan/generic.c:181 [inline]\n kasan_check_range+0x39/0x1c0 mm/kasan/generic.c:187\n instrument_atomic_read_write include/linux/instrumented.h:96 [inline]\n atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]\n queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]\n do_raw_spin_lock include/linux/spinlock.h:186 [inline]\n __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]\n _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178\n spin_lock_bh include/linux/spinlock.h:355 [inline]\n release_sock+0x1f/0x1a0 net/core/sock.c:3526\n gtp_encap_disable_sock drivers/net/gtp.c:651 [inline]\n gtp_encap_disable+0xb9/0x220 drivers/net/gtp.c:664\n gtp_dev_uninit+0x19/0x50 drivers/net/gtp.c:728\n unregister_netdevice_many_notify+0x97e/0x1520 net/core/dev.c:10841\n rtnl_delete_link net/core/rtnetlink.c:3216 [inline]\n rtnl_dellink+0x3c0/0xb30 net/core/rtnetlink.c:3268\n rtnetlink_rcv_msg+0x450/0xb10 net/core/rtnetlink.c:6423\n netlink_rcv_skb+0x15d/0x450 net/netlink/af_netlink.c:2548\n netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]\n netlink_unicast+0x700/0x930 net/netlink/af_netlink.c:1365\n netlink_sendmsg+0x91c/0xe30 net/netlink/af_netlink.c:1913\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg+0x1b7/0x200 net/socket.c:747\n ____sys_sendmsg+0x75a/0x990 net/socket.c:2493\n ___sys_sendmsg+0x11d/0x1c0 net/socket.c:2547\n __sys_sendmsg+0xfe/0x1d0 net/socket.c:2576\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3f/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f1168b1fe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f1167edccc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f1168b1fe5d\nRDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f1168b80530 R15: 0000000000000000\n \u003c/TASK\u003e\n\nAllocated by task 1483:\n kasan_save_stack+0x22/0x50 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54142",
"url": "https://www.suse.com/security/cve/CVE-2023-54142"
},
{
"category": "external",
"summary": "SUSE Bug 1256095 for CVE-2023-54142",
"url": "https://bugzilla.suse.com/1256095"
},
{
"category": "external",
"summary": "SUSE Bug 1256097 for CVE-2023-54142",
"url": "https://bugzilla.suse.com/1256097"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-54142"
},
{
"cve": "CVE-2023-54143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54143"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()\n\nIf we encounter any error in the vdec_msg_queue_init() then we need\nto set \"msg_queue-\u003ewdma_addr.size = 0;\". Normally, this is done\ninside the vdec_msg_queue_deinit() function. However, if the\nfirst call to allocate \u0026msg_queue-\u003ewdma_addr fails, then the\nvdec_msg_queue_deinit() function is a no-op. For that situation, just\nset the size to zero explicitly and return.\n\nThere were two other error paths which did not clean up before returning.\nChange those error paths to goto mem_alloc_err.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54143",
"url": "https://www.suse.com/security/cve/CVE-2023-54143"
},
{
"category": "external",
"summary": "SUSE Bug 1256096 for CVE-2023-54143",
"url": "https://bugzilla.suse.com/1256096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54143"
},
{
"cve": "CVE-2023-54145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log\n\nIt\u0027s trivial for user to trigger \"verifier log line truncated\" warning,\nas verifier has a fixed-sized buffer of 1024 bytes (as of now), and there are at\nleast two pieces of user-provided information that can be output through\nthis buffer, and both can be arbitrarily sized by user:\n - BTF names;\n - BTF.ext source code lines strings.\n\nVerifier log buffer should be properly sized for typical verifier state\noutput. But it\u0027s sort-of expected that this buffer won\u0027t be long enough\nin some circumstances. So let\u0027s drop the check. In any case code will\nwork correctly, at worst truncating a part of a single line output.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54145",
"url": "https://www.suse.com/security/cve/CVE-2023-54145"
},
{
"category": "external",
"summary": "SUSE Bug 1256090 for CVE-2023-54145",
"url": "https://bugzilla.suse.com/1256090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54145"
},
{
"cve": "CVE-2023-54148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Move representor neigh cleanup to profile cleanup_tx\n\nFor IP tunnel encapsulation in ECMP (Equal-Cost Multipath) mode, as\nthe flow is duplicated to the peer eswitch, the related neighbour\ninformation on the peer uplink representor is created as well.\n\nIn the cited commit, eswitch devcom unpair is moved to uplink unload\nAPI, specifically the profile-\u003ecleanup_tx. If there is a encap rule\noffloaded in ECMP mode, when one eswitch does unpair (because of\nunloading the driver, for instance), and the peer rule from the peer\neswitch is going to be deleted, the use-after-free error is triggered\nwhile accessing neigh info, as it is already cleaned up in uplink\u0027s\nprofile-\u003edisable, which is before its profile-\u003ecleanup_tx.\n\nTo fix this issue, move the neigh cleanup to profile\u0027s cleanup_tx\ncallback, and after mlx5e_cleanup_uplink_rep_tx is called. The neigh\ninit is moved to init_tx for symmeter.\n\n[ 2453.376299] BUG: KASAN: slab-use-after-free in mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.379125] Read of size 4 at addr ffff888127af9008 by task modprobe/2496\n\n[ 2453.381542] CPU: 7 PID: 2496 Comm: modprobe Tainted: G B 6.4.0-rc7+ #15\n[ 2453.383386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 2453.384335] Call Trace:\n[ 2453.384625] \u003cTASK\u003e\n[ 2453.384891] dump_stack_lvl+0x33/0x50\n[ 2453.385285] print_report+0xc2/0x610\n[ 2453.385667] ? __virt_addr_valid+0xb1/0x130\n[ 2453.386091] ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.386757] kasan_report+0xae/0xe0\n[ 2453.387123] ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.387798] mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.388465] mlx5e_rep_encap_entry_detach+0xa6/0xe0 [mlx5_core]\n[ 2453.389111] mlx5e_encap_dealloc+0xa7/0x100 [mlx5_core]\n[ 2453.389706] mlx5e_tc_tun_encap_dests_unset+0x61/0xb0 [mlx5_core]\n[ 2453.390361] mlx5_free_flow_attr_actions+0x11e/0x340 [mlx5_core]\n[ 2453.391015] ? complete_all+0x43/0xd0\n[ 2453.391398] ? free_flow_post_acts+0x38/0x120 [mlx5_core]\n[ 2453.392004] mlx5e_tc_del_fdb_flow+0x4ae/0x690 [mlx5_core]\n[ 2453.392618] mlx5e_tc_del_fdb_peers_flow+0x308/0x370 [mlx5_core]\n[ 2453.393276] mlx5e_tc_clean_fdb_peer_flows+0xf5/0x140 [mlx5_core]\n[ 2453.393925] mlx5_esw_offloads_unpair+0x86/0x540 [mlx5_core]\n[ 2453.394546] ? mlx5_esw_offloads_set_ns_peer.isra.0+0x180/0x180 [mlx5_core]\n[ 2453.395268] ? down_write+0xaa/0x100\n[ 2453.395652] mlx5_esw_offloads_devcom_event+0x203/0x530 [mlx5_core]\n[ 2453.396317] mlx5_devcom_send_event+0xbb/0x190 [mlx5_core]\n[ 2453.396917] mlx5_esw_offloads_devcom_cleanup+0xb0/0xd0 [mlx5_core]\n[ 2453.397582] mlx5e_tc_esw_cleanup+0x42/0x120 [mlx5_core]\n[ 2453.398182] mlx5e_rep_tc_cleanup+0x15/0x30 [mlx5_core]\n[ 2453.398768] mlx5e_cleanup_rep_tx+0x6c/0x80 [mlx5_core]\n[ 2453.399367] mlx5e_detach_netdev+0xee/0x120 [mlx5_core]\n[ 2453.399957] mlx5e_netdev_change_profile+0x84/0x170 [mlx5_core]\n[ 2453.400598] mlx5e_vport_rep_unload+0xe0/0xf0 [mlx5_core]\n[ 2453.403781] mlx5_eswitch_unregister_vport_reps+0x15e/0x190 [mlx5_core]\n[ 2453.404479] ? mlx5_eswitch_register_vport_reps+0x200/0x200 [mlx5_core]\n[ 2453.405170] ? up_write+0x39/0x60\n[ 2453.405529] ? kernfs_remove_by_name_ns+0xb7/0xe0\n[ 2453.405985] auxiliary_bus_remove+0x2e/0x40\n[ 2453.406405] device_release_driver_internal+0x243/0x2d0\n[ 2453.406900] ? kobject_put+0x42/0x2d0\n[ 2453.407284] bus_remove_device+0x128/0x1d0\n[ 2453.407687] device_del+0x240/0x550\n[ 2453.408053] ? waiting_for_supplier_show+0xe0/0xe0\n[ 2453.408511] ? kobject_put+0xfa/0x2d0\n[ 2453.408889] ? __kmem_cache_free+0x14d/0x280\n[ 2453.409310] mlx5_rescan_drivers_locked.part.0+0xcd/0x2b0 [mlx5_core]\n[ 2453.409973] mlx5_unregister_device+0x40/0x50 [mlx5_core]\n[ 2453.410561] mlx5_uninit_one+0x3d/0x110 [mlx5_core]\n[ 2453.411111] remove_one+0x89/0x130 [mlx5_core]\n[ 24\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54148",
"url": "https://www.suse.com/security/cve/CVE-2023-54148"
},
{
"category": "external",
"summary": "SUSE Bug 1256084 for CVE-2023-54148",
"url": "https://bugzilla.suse.com/1256084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54148"
},
{
"cve": "CVE-2023-54149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses\n\nWhen using the felix driver (the only one which supports UC filtering\nand MC filtering) as a DSA master for a random other DSA switch, one can\nsee the following stack trace when the downstream switch ports join a\nVLAN-aware bridge:\n\n=============================\nWARNING: suspicious RCU usage\n-----------------------------\nnet/8021q/vlan_core.c:238 suspicious rcu_dereference_protected() usage!\n\nstack backtrace:\nWorkqueue: dsa_ordered dsa_slave_switchdev_event_work\nCall trace:\n lockdep_rcu_suspicious+0x170/0x210\n vlan_for_each+0x8c/0x188\n dsa_slave_sync_uc+0x128/0x178\n __hw_addr_sync_dev+0x138/0x158\n dsa_slave_set_rx_mode+0x58/0x70\n __dev_set_rx_mode+0x88/0xa8\n dev_uc_add+0x74/0xa0\n dsa_port_bridge_host_fdb_add+0xec/0x180\n dsa_slave_switchdev_event_work+0x7c/0x1c8\n process_one_work+0x290/0x568\n\nWhat it\u0027s saying is that vlan_for_each() expects rtnl_lock() context and\nit\u0027s not getting it, when it\u0027s called from the DSA master\u0027s ndo_set_rx_mode().\n\nThe caller of that - dsa_slave_set_rx_mode() - is the slave DSA\ninterface\u0027s dsa_port_bridge_host_fdb_add() which comes from the deferred\ndsa_slave_switchdev_event_work().\n\nWe went to great lengths to avoid the rtnl_lock() context in that call\npath in commit 0faf890fc519 (\"net: dsa: drop rtnl_lock from\ndsa_slave_switchdev_event_work\"), and calling rtnl_lock() is simply not\nan option due to the possibility of deadlocking when calling\ndsa_flush_workqueue() from the call paths that do hold rtnl_lock() -\nbasically all of them.\n\nSo, when the DSA master calls vlan_for_each() from its ndo_set_rx_mode(),\nthe state of the 8021q driver on this device is really not protected\nfrom concurrent access by anything.\n\nLooking at net/8021q/, I don\u0027t think that vlan_info-\u003evid_list was\nparticularly designed with RCU traversal in mind, so introducing an RCU\nread-side form of vlan_for_each() - vlan_for_each_rcu() - won\u0027t be so\neasy, and it also wouldn\u0027t be exactly what we need anyway.\n\nIn general I believe that the solution isn\u0027t in net/8021q/ anyway;\nvlan_for_each() is not cut out for this task. DSA doesn\u0027t need rtnl_lock()\nto be held per se - since it\u0027s not a netdev state change that we\u0027re\nblocking, but rather, just concurrent additions/removals to a VLAN list.\nWe don\u0027t even need sleepable context - the callback of vlan_for_each()\njust schedules deferred work.\n\nThe proposed escape is to remove the dependency on vlan_for_each() and\nto open-code a non-sleepable, rtnl-free alternative to that, based on\ncopies of the VLAN list modified from .ndo_vlan_rx_add_vid() and\n.ndo_vlan_rx_kill_vid().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54149",
"url": "https://www.suse.com/security/cve/CVE-2023-54149"
},
{
"category": "external",
"summary": "SUSE Bug 1256085 for CVE-2023-54149",
"url": "https://bugzilla.suse.com/1256085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54149"
},
{
"cve": "CVE-2023-54153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: turn quotas off if mount failed after enabling quotas\n\nYi found during a review of the patch \"ext4: don\u0027t BUG on inconsistent\njournal feature\" that when ext4_mark_recovery_complete() returns an error\nvalue, the error handling path does not turn off the enabled quotas,\nwhich triggers the following kmemleak:\n\n================================================================\nunreferenced object 0xffff8cf68678e7c0 (size 64):\ncomm \"mount\", pid 746, jiffies 4294871231 (age 11.540s)\nhex dump (first 32 bytes):\n00 90 ef 82 f6 8c ff ff 00 00 00 00 41 01 00 00 ............A...\nc7 00 00 00 bd 00 00 00 0a 00 00 00 48 00 00 00 ............H...\nbacktrace:\n[\u003c00000000c561ef24\u003e] __kmem_cache_alloc_node+0x4d4/0x880\n[\u003c00000000d4e621d7\u003e] kmalloc_trace+0x39/0x140\n[\u003c00000000837eee74\u003e] v2_read_file_info+0x18a/0x3a0\n[\u003c0000000088f6c877\u003e] dquot_load_quota_sb+0x2ed/0x770\n[\u003c00000000340a4782\u003e] dquot_load_quota_inode+0xc6/0x1c0\n[\u003c0000000089a18bd5\u003e] ext4_enable_quotas+0x17e/0x3a0 [ext4]\n[\u003c000000003a0268fa\u003e] __ext4_fill_super+0x3448/0x3910 [ext4]\n[\u003c00000000b0f2a8a8\u003e] ext4_fill_super+0x13d/0x340 [ext4]\n[\u003c000000004a9489c4\u003e] get_tree_bdev+0x1dc/0x370\n[\u003c000000006e723bf1\u003e] ext4_get_tree+0x1d/0x30 [ext4]\n[\u003c00000000c7cb663d\u003e] vfs_get_tree+0x31/0x160\n[\u003c00000000320e1bed\u003e] do_new_mount+0x1d5/0x480\n[\u003c00000000c074654c\u003e] path_mount+0x22e/0xbe0\n[\u003c0000000003e97a8e\u003e] do_mount+0x95/0xc0\n[\u003c000000002f3d3736\u003e] __x64_sys_mount+0xc4/0x160\n[\u003c0000000027d2140c\u003e] do_syscall_64+0x3f/0x90\n================================================================\n\nTo solve this problem, we add a \"failed_mount10\" tag, and call\next4_quota_off_umount() in this tag to release the enabled qoutas.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54153",
"url": "https://www.suse.com/security/cve/CVE-2023-54153"
},
{
"category": "external",
"summary": "SUSE Bug 1256081 for CVE-2023-54153",
"url": "https://bugzilla.suse.com/1256081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54153"
},
{
"cve": "CVE-2023-54154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Fix target_cmd_counter leak\n\nThe target_cmd_counter struct allocated via target_alloc_cmd_counter() is\nnever freed, resulting in leaks across various transport types, e.g.:\n\n unreferenced object 0xffff88801f920120 (size 96):\n comm \"sh\", pid 102, jiffies 4294892535 (age 713.412s)\n hex dump (first 32 bytes):\n 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 38 01 92 1f 80 88 ff ff ........8.......\n backtrace:\n [\u003c00000000e58a6252\u003e] kmalloc_trace+0x11/0x20\n [\u003c0000000043af4b2f\u003e] target_alloc_cmd_counter+0x17/0x90 [target_core_mod]\n [\u003c000000007da2dfa7\u003e] target_setup_session+0x2d/0x140 [target_core_mod]\n [\u003c0000000068feef86\u003e] tcm_loop_tpg_nexus_store+0x19b/0x350 [tcm_loop]\n [\u003c000000006a80e021\u003e] configfs_write_iter+0xb1/0x120\n [\u003c00000000e9f4d860\u003e] vfs_write+0x2e4/0x3c0\n [\u003c000000008143433b\u003e] ksys_write+0x80/0xb0\n [\u003c00000000a7df29b2\u003e] do_syscall_64+0x42/0x90\n [\u003c0000000053f45fb8\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nFree the structure alongside the corresponding iscsit_conn / se_sess\nparent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54154",
"url": "https://www.suse.com/security/cve/CVE-2023-54154"
},
{
"category": "external",
"summary": "SUSE Bug 1256082 for CVE-2023-54154",
"url": "https://bugzilla.suse.com/1256082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54154"
},
{
"cve": "CVE-2023-54155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()\n\nSyzkaller reported the following issue:\n=======================================\nToo BIG xdp-\u003eframe_sz = 131072\nWARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121\n ____bpf_xdp_adjust_tail net/core/filter.c:4121 [inline]\nWARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121\n bpf_xdp_adjust_tail+0x466/0xa10 net/core/filter.c:4103\n...\nCall Trace:\n \u003cTASK\u003e\n bpf_prog_4add87e5301a4105+0x1a/0x1c\n __bpf_prog_run include/linux/filter.h:600 [inline]\n bpf_prog_run_xdp include/linux/filter.h:775 [inline]\n bpf_prog_run_generic_xdp+0x57e/0x11e0 net/core/dev.c:4721\n netif_receive_generic_xdp net/core/dev.c:4807 [inline]\n do_xdp_generic+0x35c/0x770 net/core/dev.c:4866\n tun_get_user+0x2340/0x3ca0 drivers/net/tun.c:1919\n tun_chr_write_iter+0xe8/0x210 drivers/net/tun.c:2043\n call_write_iter include/linux/fs.h:1871 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x650/0xe40 fs/read_write.c:584\n ksys_write+0x12f/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nxdp-\u003eframe_sz \u003e PAGE_SIZE check was introduced in commit c8741e2bfe87\n(\"xdp: Allow bpf_xdp_adjust_tail() to grow packet size\"). But Jesper\nDangaard Brouer \u003cjbrouer@redhat.com\u003e noted that after introducing the\nxdp_init_buff() which all XDP driver use - it\u0027s safe to remove this\ncheck. The original intend was to catch cases where XDP drivers have\nnot been updated to use xdp.frame_sz, but that is not longer a concern\n(since xdp_init_buff).\n\nRunning the initial syzkaller repro it was discovered that the\ncontiguous physical memory allocation is used for both xdp paths in\ntun_get_user(), e.g. tun_build_skb() and tun_alloc_skb(). It was also\nstated by Jesper Dangaard Brouer \u003cjbrouer@redhat.com\u003e that XDP can\nwork on higher order pages, as long as this is contiguous physical\nmemory (e.g. a page).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54155",
"url": "https://www.suse.com/security/cve/CVE-2023-54155"
},
{
"category": "external",
"summary": "SUSE Bug 1256083 for CVE-2023-54155",
"url": "https://bugzilla.suse.com/1256083"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54155"
},
{
"cve": "CVE-2023-54156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix crash when reading stats while NIC is resetting\n\nefx_net_stats() (.ndo_get_stats64) can be called during an ethtool\n selftest, during which time nic_data-\u003emc_stats is NULL as the NIC has\n been fini\u0027d. In this case do not attempt to fetch the latest stats\n from the hardware, else we will crash on a NULL dereference:\n BUG: kernel NULL pointer dereference, address: 0000000000000038\n RIP efx_nic_update_stats\n abridged calltrace:\n efx_ef10_update_stats_pf\n efx_net_stats\n dev_get_stats\n dev_seq_printf_stats\nSkipping the read is safe, we will simply give out stale stats.\nTo ensure that the free in efx_ef10_fini_nic() does not race against\n efx_ef10_update_stats_pf(), which could cause a TOCTTOU bug, take the\n efx-\u003estats_lock in fini_nic (it is already held across update_stats).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54156",
"url": "https://www.suse.com/security/cve/CVE-2023-54156"
},
{
"category": "external",
"summary": "SUSE Bug 1255704 for CVE-2023-54156",
"url": "https://bugzilla.suse.com/1255704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54156"
},
{
"cve": "CVE-2023-54164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: fix iso_conn related locking and validity issues\n\nsk-\u003esk_state indicates whether iso_pi(sk)-\u003econn is valid. Operations\nthat check/update sk_state and access conn should hold lock_sock,\notherwise they can race.\n\nThe order of taking locks is hci_dev_lock \u003e lock_sock \u003e iso_conn_lock,\nwhich is how it is in connect/disconnect_cfm -\u003e iso_conn_del -\u003e\niso_chan_del.\n\nFix locking in iso_connect_cis/bis and sendmsg/recvmsg to take lock_sock\naround updating sk_state and conn.\n\niso_conn_del must not occur during iso_connect_cis/bis, as it frees the\niso_conn. Hold hdev-\u003elock longer to prevent that.\n\nThis should not reintroduce the issue fixed in commit 241f51931c35\n(\"Bluetooth: ISO: Avoid circular locking dependency\"), since the we\nacquire locks in order. We retain the fix in iso_sock_connect to release\nlock_sock before iso_connect_* acquires hdev-\u003elock.\n\nSimilarly for commit 6a5ad251b7cd (\"Bluetooth: ISO: Fix possible\ncircular locking dependency\"). We retain the fix in iso_conn_ready to\nnot acquire iso_conn_lock before lock_sock.\n\niso_conn_add shall return iso_conn with valid hcon. Make it so also when\nreusing an old CIS connection waiting for disconnect timeout (see\n__iso_sock_close where conn-\u003ehcon is set to NULL).\n\nTrace with iso_conn_del after iso_chan_add in iso_connect_cis:\n===============================================================\niso_sock_create:771: sock 00000000be9b69b7\niso_sock_init:693: sk 000000004dff667e\niso_sock_bind:827: sk 000000004dff667e 70:1a:b8:98:ff:a2 type 1\niso_sock_setsockopt:1289: sk 000000004dff667e\niso_sock_setsockopt:1289: sk 000000004dff667e\niso_sock_setsockopt:1289: sk 000000004dff667e\niso_sock_connect:875: sk 000000004dff667e\niso_connect_cis:353: 70:1a:b8:98:ff:a2 -\u003e 28:3d:c2:4a:7e:da\nhci_get_route:1199: 70:1a:b8:98:ff:a2 -\u003e 28:3d:c2:4a:7e:da\nhci_conn_add:1005: hci0 dst 28:3d:c2:4a:7e:da\niso_conn_add:140: hcon 000000007b65d182 conn 00000000daf8625e\n__iso_chan_add:214: conn 00000000daf8625e\niso_connect_cfm:1700: hcon 000000007b65d182 bdaddr 28:3d:c2:4a:7e:da status 12\niso_conn_del:187: hcon 000000007b65d182 conn 00000000daf8625e, err 16\niso_sock_clear_timer:117: sock 000000004dff667e state 3\n \u003cNote: sk_state is BT_BOUND (3), so iso_connect_cis is still\n running at this point\u003e\niso_chan_del:153: sk 000000004dff667e, conn 00000000daf8625e, err 16\nhci_conn_del:1151: hci0 hcon 000000007b65d182 handle 65535\nhci_conn_unlink:1102: hci0: hcon 000000007b65d182\nhci_chan_list_flush:2780: hcon 000000007b65d182\niso_sock_getsockopt:1376: sk 000000004dff667e\niso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e\niso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e\niso_sock_getsockopt:1376: sk 000000004dff667e\niso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e\niso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e\niso_sock_shutdown:1434: sock 00000000be9b69b7, sk 000000004dff667e, how 1\n__iso_sock_close:632: sk 000000004dff667e state 5 socket 00000000be9b69b7\n \u003cNote: sk_state is BT_CONNECT (5), even though iso_chan_del sets\n BT_CLOSED (6). Only iso_connect_cis sets it to BT_CONNECT, so it\n must be that iso_chan_del occurred between iso_chan_add and end of\n iso_connect_cis.\u003e\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 8000000006467067 P4D 8000000006467067 PUD 3f5f067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nRIP: 0010:__iso_sock_close (net/bluetooth/iso.c:664) bluetooth\n===============================================================\n\nTrace with iso_conn_del before iso_chan_add in iso_connect_cis:\n===============================================================\niso_connect_cis:356: 70:1a:b8:98:ff:a2 -\u003e 28:3d:c2:4a:7e:da\n...\niso_conn_add:140: hcon 0000000093bc551f conn 00000000768ae504\nhci_dev_put:1487: hci0 orig refcnt 21\nhci_event_packet:7607: hci0: e\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54164",
"url": "https://www.suse.com/security/cve/CVE-2023-54164"
},
{
"category": "external",
"summary": "SUSE Bug 1256071 for CVE-2023-54164",
"url": "https://bugzilla.suse.com/1256071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54164"
},
{
"cve": "CVE-2023-54166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix Kernel Panic during ndo_tx_timeout callback\n\nThe Xeon validation group has been carrying out some loaded tests\nwith various HW configurations, and they have seen some transmit\nqueue time out happening during the test. This will cause the\nreset adapter function to be called by igc_tx_timeout().\nSimilar race conditions may arise when the interface is being brought\ndown and up in igc_reinit_locked(), an interrupt being generated, and\nigc_clean_tx_irq() being called to complete the TX.\n\nWhen the igc_tx_timeout() function is invoked, this patch will turn\noff all TX ring HW queues during igc_down() process. TX ring HW queues\nwill be activated again during the igc_configure_tx_ring() process\nwhen performing the igc_up() procedure later.\n\nThis patch also moved existing igc_disable_tx_ring_hw() to avoid using\nforward declaration.\n\nKernel trace:\n[ 7678.747813] ------------[ cut here ]------------\n[ 7678.757914] NETDEV WATCHDOG: enp1s0 (igc): transmit queue 2 timed out\n[ 7678.770117] WARNING: CPU: 0 PID: 13 at net/sched/sch_generic.c:525 dev_watchdog+0x1ae/0x1f0\n[ 7678.784459] Modules linked in: xt_conntrack nft_chain_nat xt_MASQUERADE xt_addrtype nft_compat\nnf_tables nfnetlink br_netfilter bridge stp llc overlay dm_mod emrcha(PO) emriio(PO) rktpm(PO)\ncegbuf_mod(PO) patch_update(PO) se(PO) sgx_tgts(PO) mktme(PO) keylocker(PO) svtdx(PO) svfs_pci_hotplug(PO)\nvtd_mod(PO) davemem(PO) svmabort(PO) svindexio(PO) usbx2(PO) ehci_sched(PO) svheartbeat(PO) ioapic(PO)\nsv8259(PO) svintr(PO) lt(PO) pcierootport(PO) enginefw_mod(PO) ata(PO) smbus(PO) spiflash_cdf(PO) arden(PO)\ndsa_iax(PO) oobmsm_punit(PO) cpm(PO) svkdb(PO) ebg_pch(PO) pch(PO) sviotargets(PO) svbdf(PO) svmem(PO)\nsvbios(PO) dram(PO) svtsc(PO) targets(PO) superio(PO) svkernel(PO) cswitch(PO) mcf(PO) pentiumIII_mod(PO)\nfs_svfs(PO) mdevdefdb(PO) svfs_os_services(O) ixgbe mdio mdio_devres libphy emeraldrapids_svdefs(PO)\nregsupport(O) libnvdimm nls_cp437 snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel\nsnd_intel_dspcfg snd_hda_codec snd_hwdep x86_pkg_temp_thermal snd_hda_core snd_pcm snd_timer isst_if_mbox_pci\n[ 7678.784496] input_leds isst_if_mmio sg snd isst_if_common soundcore wmi button sad9(O) drm fuse backlight\nconfigfs efivarfs ip_tables x_tables vmd sdhci led_class rtl8150 r8152 hid_generic pegasus mmc_block usbhid\nmmc_core hid megaraid_sas ixgb igb i2c_algo_bit ice i40e hpsa scsi_transport_sas e1000e e1000 e100 ax88179_178a\nusbnet xhci_pci sd_mod xhci_hcd t10_pi crc32c_intel crc64_rocksoft igc crc64 crc_t10dif usbcore\ncrct10dif_generic ptp crct10dif_common usb_common pps_core\n[ 7679.200403] RIP: 0010:dev_watchdog+0x1ae/0x1f0\n[ 7679.210201] Code: 28 e9 53 ff ff ff 4c 89 e7 c6 05 06 42 b9 00 01 e8 17 d1 fb ff 44 89 e9 4c\n89 e6 48 c7 c7 40 ad fb 81 48 89 c2 e8 52 62 82 ff \u003c0f\u003e 0b e9 72 ff ff ff 65 8b 05 80 7d 7c 7e\n89 c0 48 0f a3 05 0a c1\n[ 7679.245438] RSP: 0018:ffa00000001f7d90 EFLAGS: 00010282\n[ 7679.256021] RAX: 0000000000000000 RBX: ff11000109938440 RCX: 0000000000000000\n[ 7679.268710] RDX: ff11000361e26cd8 RSI: ff11000361e1b880 RDI: ff11000361e1b880\n[ 7679.281314] RBP: ffa00000001f7da8 R08: ff1100035f8fffe8 R09: 0000000000027ffb\n[ 7679.293840] R10: 0000000000001f0a R11: ff1100035f840000 R12: ff11000109938000\n[ 7679.306276] R13: 0000000000000002 R14: dead000000000122 R15: ffa00000001f7e18\n[ 7679.318648] FS: 0000000000000000(0000) GS:ff11000361e00000(0000) knlGS:0000000000000000\n[ 7679.332064] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7679.342757] CR2: 00007ffff7fca168 CR3: 000000013b08a006 CR4: 0000000000471ef8\n[ 7679.354984] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 7679.367207] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 7679.379370] PKRU: 55555554\n[ 7679.386446] Call Trace:\n[ 7679.393152] \u003cTASK\u003e\n[ 7679.399363] ? __pfx_dev_watchdog+0x10/0x10\n[ 7679.407870] call_timer_fn+0x31/0x110\n[ 7679.415698] e\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54166",
"url": "https://www.suse.com/security/cve/CVE-2023-54166"
},
{
"category": "external",
"summary": "SUSE Bug 1256074 for CVE-2023-54166",
"url": "https://bugzilla.suse.com/1256074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54166"
},
{
"cve": "CVE-2023-54169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix memory leak in mlx5e_ptp_open\n\nWhen kvzalloc_node or kvzalloc failed in mlx5e_ptp_open, the memory\npointed by \"c\" or \"cparams\" is not freed, which can lead to a memory\nleak. Fix by freeing the array in the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54169",
"url": "https://www.suse.com/security/cve/CVE-2023-54169"
},
{
"category": "external",
"summary": "SUSE Bug 1256050 for CVE-2023-54169",
"url": "https://bugzilla.suse.com/1256050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54169"
},
{
"cve": "CVE-2023-54170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix linking a duplicate key to a keyring\u0027s assoc_array\n\nWhen making a DNS query inside the kernel using dns_query(), the request\ncode can in rare cases end up creating a duplicate index key in the\nassoc_array of the destination keyring. It is eventually found by\na BUG_ON() check in the assoc_array implementation and results in\na crash.\n\nExample report:\n[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!\n[2158499.700039] invalid opcode: 0000 [#1] SMP PTI\n[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3\n[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]\n[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40\n[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff \u003c0f\u003e 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f\n[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282\n[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005\n[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000\n[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000\n[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28\n[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740\n[2158499.700585] FS: 0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000\n[2158499.700610] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0\n[2158499.700702] Call Trace:\n[2158499.700741] ? key_alloc+0x447/0x4b0\n[2158499.700768] ? __key_link_begin+0x43/0xa0\n[2158499.700790] __key_link_begin+0x43/0xa0\n[2158499.700814] request_key_and_link+0x2c7/0x730\n[2158499.700847] ? dns_resolver_read+0x20/0x20 [dns_resolver]\n[2158499.700873] ? key_default_cmp+0x20/0x20\n[2158499.700898] request_key_tag+0x43/0xa0\n[2158499.700926] dns_query+0x114/0x2ca [dns_resolver]\n[2158499.701127] dns_resolve_server_name_to_ip+0x194/0x310 [cifs]\n[2158499.701164] ? scnprintf+0x49/0x90\n[2158499.701190] ? __switch_to_asm+0x40/0x70\n[2158499.701211] ? __switch_to_asm+0x34/0x70\n[2158499.701405] reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]\n[2158499.701603] cifs_resolve_server+0x4b/0xd0 [cifs]\n[2158499.701632] process_one_work+0x1f8/0x3e0\n[2158499.701658] worker_thread+0x2d/0x3f0\n[2158499.701682] ? process_one_work+0x3e0/0x3e0\n[2158499.701703] kthread+0x10d/0x130\n[2158499.701723] ? kthread_park+0xb0/0xb0\n[2158499.701746] ret_from_fork+0x1f/0x40\n\nThe situation occurs as follows:\n* Some kernel facility invokes dns_query() to resolve a hostname, for\n example, \"abcdef\". The function registers its global DNS resolver\n cache as current-\u003ecred.thread_keyring and passes the query to\n request_key_net() -\u003e request_key_tag() -\u003e request_key_and_link().\n* Function request_key_and_link() creates a keyring_search_context\n object. Its match_data.cmp method gets set via a call to\n type-\u003ematch_preparse() (resolves to dns_resolver_match_preparse()) to\n dns_resolver_cmp().\n* Function request_key_and_link() continues and invokes\n search_process_keyrings_rcu() which returns that a given key was not\n found. The control is then passed to request_key_and_link() -\u003e\n construct_alloc_key().\n* Concurrently to that, a second task similarly makes a DNS query for\n \"abcdef.\" and its result gets inserted into the DNS resolver cache.\n* Back on the first task, function construct_alloc_key() first runs\n __key_link_begin() to determine an assoc_array_edit operation to\n insert a new key. Index keys in the array are compared exactly as-is,\n using keyring_compare_object(). The operation \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54170",
"url": "https://www.suse.com/security/cve/CVE-2023-54170"
},
{
"category": "external",
"summary": "SUSE Bug 1256045 for CVE-2023-54170",
"url": "https://bugzilla.suse.com/1256045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54170"
},
{
"cve": "CVE-2023-54171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix memory leak of iter-\u003etemp when reading trace_pipe\n\nkmemleak reports:\n unreferenced object 0xffff88814d14e200 (size 256):\n comm \"cat\", pid 336, jiffies 4294871818 (age 779.490s)\n hex dump (first 32 bytes):\n 04 00 01 03 00 00 00 00 08 00 00 00 00 00 00 00 ................\n 0c d8 c8 9b ff ff ff ff 04 5a ca 9b ff ff ff ff .........Z......\n backtrace:\n [\u003cffffffff9bdff18f\u003e] __kmalloc+0x4f/0x140\n [\u003cffffffff9bc9238b\u003e] trace_find_next_entry+0xbb/0x1d0\n [\u003cffffffff9bc9caef\u003e] trace_print_lat_context+0xaf/0x4e0\n [\u003cffffffff9bc94490\u003e] print_trace_line+0x3e0/0x950\n [\u003cffffffff9bc95499\u003e] tracing_read_pipe+0x2d9/0x5a0\n [\u003cffffffff9bf03a43\u003e] vfs_read+0x143/0x520\n [\u003cffffffff9bf04c2d\u003e] ksys_read+0xbd/0x160\n [\u003cffffffff9d0f0edf\u003e] do_syscall_64+0x3f/0x90\n [\u003cffffffff9d2000aa\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nwhen reading file \u0027trace_pipe\u0027, \u0027iter-\u003etemp\u0027 is allocated or relocated\nin trace_find_next_entry() but not freed before \u0027trace_pipe\u0027 is closed.\n\nTo fix it, free \u0027iter-\u003etemp\u0027 in tracing_release_pipe().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54171",
"url": "https://www.suse.com/security/cve/CVE-2023-54171"
},
{
"category": "external",
"summary": "SUSE Bug 1256034 for CVE-2023-54171",
"url": "https://bugzilla.suse.com/1256034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54171"
},
{
"cve": "CVE-2023-54172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction\n\nOn hardware that supports Indirect Branch Tracking (IBT), Hyper-V VMs\nwith ConfigVersion 9.3 or later support IBT in the guest. However,\ncurrent versions of Hyper-V have a bug in that there\u0027s not an ENDBR64\ninstruction at the beginning of the hypercall page. Since hypercalls are\nmade with an indirect call to the hypercall page, all hypercall attempts\nfail with an exception and Linux panics.\n\nA Hyper-V fix is in progress to add ENDBR64. But guard against the Linux\npanic by clearing X86_FEATURE_IBT if the hypercall page doesn\u0027t start\nwith ENDBR. The VM will boot and run without IBT.\n\nIf future Linux 32-bit kernels were to support IBT, additional hypercall\npage hackery would be needed to make IBT work for such kernels in a\nHyper-V VM.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54172",
"url": "https://www.suse.com/security/cve/CVE-2023-54172"
},
{
"category": "external",
"summary": "SUSE Bug 1256033 for CVE-2023-54172",
"url": "https://bugzilla.suse.com/1256033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54172"
},
{
"cve": "CVE-2023-54173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Disable preemption in bpf_event_output\n\nWe received report [1] of kernel crash, which is caused by\nusing nesting protection without disabled preemption.\n\nThe bpf_event_output can be called by programs executed by\nbpf_prog_run_array_cg function that disabled migration but\nkeeps preemption enabled.\n\nThis can cause task to be preempted by another one inside the\nnesting protection and lead eventually to two tasks using same\nperf_sample_data buffer and cause crashes like:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000001\n #PF: supervisor instruction fetch in kernel mode\n #PF: error_code(0x0010) - not-present page\n ...\n ? perf_output_sample+0x12a/0x9a0\n ? finish_task_switch.isra.0+0x81/0x280\n ? perf_event_output+0x66/0xa0\n ? bpf_event_output+0x13a/0x190\n ? bpf_event_output_data+0x22/0x40\n ? bpf_prog_dfc84bbde731b257_cil_sock4_connect+0x40a/0xacb\n ? xa_load+0x87/0xe0\n ? __cgroup_bpf_run_filter_sock_addr+0xc1/0x1a0\n ? release_sock+0x3e/0x90\n ? sk_setsockopt+0x1a1/0x12f0\n ? udp_pre_connect+0x36/0x50\n ? inet_dgram_connect+0x93/0xa0\n ? __sys_connect+0xb4/0xe0\n ? udp_setsockopt+0x27/0x40\n ? __pfx_udp_push_pending_frames+0x10/0x10\n ? __sys_setsockopt+0xdf/0x1a0\n ? __x64_sys_connect+0xf/0x20\n ? do_syscall_64+0x3a/0x90\n ? entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFixing this by disabling preemption in bpf_event_output.\n\n[1] https://github.com/cilium/cilium/issues/26756",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54173",
"url": "https://www.suse.com/security/cve/CVE-2023-54173"
},
{
"category": "external",
"summary": "SUSE Bug 1255996 for CVE-2023-54173",
"url": "https://bugzilla.suse.com/1255996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54173"
},
{
"cve": "CVE-2023-54177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: fix warning in dqgrab()\n\nThere\u0027s issue as follows when do fault injection:\nWARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0\nModules linked in:\nCPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505-00006-g5107a9c821af-dirty #541\nRIP: 0010:dquot_disable+0x13b7/0x18c0\nRSP: 0018:ffffc9000acc79e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88825e41b980\nRDX: 0000000000000000 RSI: ffff88825e41b980 RDI: 0000000000000002\nRBP: ffff888179f68000 R08: ffffffff82087ca7 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffed102f3ed026 R12: ffff888179f68130\nR13: ffff888179f68110 R14: dffffc0000000000 R15: ffff888179f68118\nFS: 00007f450a073740(0000) GS:ffff88882fc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe96f2efd8 CR3: 000000025c8ad000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dquot_load_quota_sb+0xd53/0x1060\n dquot_resume+0x172/0x230\n ext4_reconfigure+0x1dc6/0x27b0\n reconfigure_super+0x515/0xa90\n __x64_sys_fsconfig+0xb19/0xd20\n do_syscall_64+0x39/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAbove issue may happens as follows:\nProcessA ProcessB ProcessC\nsys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_suspend -\u003e suspend all type quota\n\n sys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_resume\n ret = dquot_load_quota_sb\n add_dquot_ref\n do_open -\u003e open file O_RDWR\n vfs_open\n do_dentry_open\n get_write_access\n atomic_inc_unless_negative(\u0026inode-\u003ei_writecount)\n ext4_file_open\n dquot_file_open\n dquot_initialize\n __dquot_initialize\n dqget\n\t\t\t\t\t\t atomic_inc(\u0026dquot-\u003edq_count);\n\n __dquot_initialize\n __dquot_initialize\n dqget\n if (!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n ext4_acquire_dquot\n\t\t\t -\u003e Return error DQ_ACTIVE_B flag isn\u0027t set\n dquot_disable\n\t\t\t invalidate_dquots\n\t\t\t if (atomic_read(\u0026dquot-\u003edq_count))\n\t dqgrab\n\t\t\t WARN_ON_ONCE(!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n\t -\u003e Trigger warning\n\nIn the above scenario, \u0027dquot-\u003edq_flags\u0027 has no DQ_ACTIVE_B is normal when\ndqgrab().\nTo solve above issue just replace the dqgrab() use in invalidate_dquots() with\natomic_inc(\u0026dquot-\u003edq_count).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54177",
"url": "https://www.suse.com/security/cve/CVE-2023-54177"
},
{
"category": "external",
"summary": "SUSE Bug 1255993 for CVE-2023-54177",
"url": "https://bugzilla.suse.com/1255993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54177"
},
{
"cve": "CVE-2023-54178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()\n\nwhen kmalloc() fail to allocate memory in kasprintf(), name\nor full_name will be NULL, strcmp() will cause\nnull pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54178",
"url": "https://www.suse.com/security/cve/CVE-2023-54178"
},
{
"category": "external",
"summary": "SUSE Bug 1255992 for CVE-2023-54178",
"url": "https://bugzilla.suse.com/1255992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54178"
},
{
"cve": "CVE-2023-54179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Array index may go out of bound\n\nKlocwork reports array \u0027vha-\u003ehost_str\u0027 of size 16 may use index value(s)\n16..19. Use snprintf() instead of sprintf().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54179",
"url": "https://www.suse.com/security/cve/CVE-2023-54179"
},
{
"category": "external",
"summary": "SUSE Bug 1255994 for CVE-2023-54179",
"url": "https://bugzilla.suse.com/1255994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54179"
},
{
"cve": "CVE-2023-54181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix issue in verifying allow_ptr_leaks\n\nAfter we converted the capabilities of our networking-bpf program from\ncap_sys_admin to cap_net_admin+cap_bpf, our networking-bpf program\nfailed to start. Because it failed the bpf verifier, and the error log\nis \"R3 pointer comparison prohibited\".\n\nA simple reproducer as follows,\n\nSEC(\"cls-ingress\")\nint ingress(struct __sk_buff *skb)\n{\n\tstruct iphdr *iph = (void *)(long)skb-\u003edata + sizeof(struct ethhdr);\n\n\tif ((long)(iph + 1) \u003e (long)skb-\u003edata_end)\n\t\treturn TC_ACT_STOLEN;\n\treturn TC_ACT_OK;\n}\n\nPer discussion with Yonghong and Alexei [1], comparison of two packet\npointers is not a pointer leak. This patch fixes it.\n\nOur local kernel is 6.1.y and we expect this fix to be backported to\n6.1.y, so stable is CCed.\n\n[1]. https://lore.kernel.org/bpf/CAADnVQ+Nmspr7Si+pxWn8zkE7hX-7s93ugwC+94aXSy4uQ9vBg@mail.gmail.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54181",
"url": "https://www.suse.com/security/cve/CVE-2023-54181"
},
{
"category": "external",
"summary": "SUSE Bug 1255988 for CVE-2023-54181",
"url": "https://bugzilla.suse.com/1255988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54181"
},
{
"cve": "CVE-2023-54183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()\n\nIf fwnode_graph_get_remote_endpoint() fails, \u0027fwnode\u0027 is known to be NULL,\nso fwnode_handle_put() is a no-op.\n\nRelease the reference taken from a previous fwnode_graph_get_port_parent()\ncall instead.\n\nAlso handle fwnode_graph_get_port_parent() failures.\n\nIn order to fix these issues, add an error handling path to the function\nand the needed gotos.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54183",
"url": "https://www.suse.com/security/cve/CVE-2023-54183"
},
{
"category": "external",
"summary": "SUSE Bug 1255990 for CVE-2023-54183",
"url": "https://bugzilla.suse.com/1255990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54183"
},
{
"cve": "CVE-2023-54185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: remove BUG_ON()\u0027s in add_new_free_space()\n\nAt add_new_free_space() we have these BUG_ON()\u0027s that are there to deal\nwith any failure to add free space to the in memory free space cache.\nSuch failures are mostly -ENOMEM that should be very rare. However there\u0027s\nno need to have these BUG_ON()\u0027s, we can just return any error to the\ncaller and all callers and their upper call chain are already dealing with\nerrors.\n\nSo just make add_new_free_space() return any errors, while removing the\nBUG_ON()\u0027s, and returning the total amount of added free space to an\noptional u64 pointer argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54185",
"url": "https://www.suse.com/security/cve/CVE-2023-54185"
},
{
"category": "external",
"summary": "SUSE Bug 1255984 for CVE-2023-54185",
"url": "https://bugzilla.suse.com/1255984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54185"
},
{
"cve": "CVE-2023-54189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Add check for kstrdup\n\nAdd check for the return value of kstrdup() and return the error\nif it fails in order to avoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54189",
"url": "https://www.suse.com/security/cve/CVE-2023-54189"
},
{
"category": "external",
"summary": "SUSE Bug 1255978 for CVE-2023-54189",
"url": "https://bugzilla.suse.com/1255978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54189"
},
{
"cve": "CVE-2023-54194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree\n\nThe call stack shown below is a scenario in the Linux 4.19 kernel.\nAllocating memory failed where exfat fs use kmalloc_array due to\nsystem memory fragmentation, while the u-disk was inserted without\nrecognition.\nDevices such as u-disk using the exfat file system are pluggable and\nmay be insert into the system at any time.\nHowever, long-term running systems cannot guarantee the continuity of\nphysical memory. Therefore, it\u0027s necessary to address this issue.\n\nBinder:2632_6: page allocation failure: order:4,\n mode:0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)\nCall trace:\n[242178.097582] dump_backtrace+0x0/0x4\n[242178.097589] dump_stack+0xf4/0x134\n[242178.097598] warn_alloc+0xd8/0x144\n[242178.097603] __alloc_pages_nodemask+0x1364/0x1384\n[242178.097608] kmalloc_order+0x2c/0x510\n[242178.097612] kmalloc_order_trace+0x40/0x16c\n[242178.097618] __kmalloc+0x360/0x408\n[242178.097624] load_alloc_bitmap+0x160/0x284\n[242178.097628] exfat_fill_super+0xa3c/0xe7c\n[242178.097635] mount_bdev+0x2e8/0x3a0\n[242178.097638] exfat_fs_mount+0x40/0x50\n[242178.097643] mount_fs+0x138/0x2e8\n[242178.097649] vfs_kern_mount+0x90/0x270\n[242178.097655] do_mount+0x798/0x173c\n[242178.097659] ksys_mount+0x114/0x1ac\n[242178.097665] __arm64_sys_mount+0x24/0x34\n[242178.097671] el0_svc_common+0xb8/0x1b8\n[242178.097676] el0_svc_handler+0x74/0x90\n[242178.097681] el0_svc+0x8/0x340\n\nBy analyzing the exfat code,we found that continuous physical memory\nis not required here,so kvmalloc_array is used can solve this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54194",
"url": "https://www.suse.com/security/cve/CVE-2023-54194"
},
{
"category": "external",
"summary": "SUSE Bug 1255974 for CVE-2023-54194",
"url": "https://bugzilla.suse.com/1255974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54194"
},
{
"cve": "CVE-2023-54201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/efa: Fix wrong resources deallocation order\n\nWhen trying to destroy QP or CQ, we first decrease the refcount and\npotentially free memory regions allocated for the object and then\nrequest the device to destroy the object. If the device fails, the\nobject isn\u0027t fully destroyed so the user/IB core can try to destroy the\nobject again which will lead to underflow when trying to decrease an\nalready zeroed refcount.\n\nDeallocate resources in reverse order of allocating them to safely free\nthem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54201",
"url": "https://www.suse.com/security/cve/CVE-2023-54201"
},
{
"category": "external",
"summary": "SUSE Bug 1255964 for CVE-2023-54201",
"url": "https://bugzilla.suse.com/1255964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54201"
},
{
"cve": "CVE-2023-54204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sunplus: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value,\n1. the memory allocated in mmc_alloc_host() will be leaked\n2. null-ptr-deref will happen when calling mmc_remove_host()\nin remove function spmmc_drv_remove() because deleting not\nadded device.\n\nFix this by checking the return value of mmc_add_host(). Moreover,\nI fixed the error handling path of spmmc_drv_probe() to clean up.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54204",
"url": "https://www.suse.com/security/cve/CVE-2023-54204"
},
{
"category": "external",
"summary": "SUSE Bug 1255967 for CVE-2023-54204",
"url": "https://bugzilla.suse.com/1255967"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54204"
},
{
"cve": "CVE-2023-54207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: uclogic: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54207",
"url": "https://www.suse.com/security/cve/CVE-2023-54207"
},
{
"category": "external",
"summary": "SUSE Bug 1255961 for CVE-2023-54207",
"url": "https://bugzilla.suse.com/1255961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54207"
},
{
"cve": "CVE-2023-54209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix blktrace debugfs entries leakage\n\nCommit 99d055b4fd4b (\"block: remove per-disk debugfs files in\nblk_unregister_queue\") moves blk_trace_shutdown() from\nblk_release_queue() to blk_unregister_queue(), this is safe if blktrace\nis created through sysfs, however, there is a regression in corner\ncase.\n\nblktrace can still be enabled after del_gendisk() through ioctl if\nthe disk is opened before del_gendisk(), and if blktrace is not shutdown\nthrough ioctl before closing the disk, debugfs entries will be leaked.\n\nFix this problem by shutdown blktrace in disk_release(), this is safe\nbecause blk_trace_remove() is reentrant.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54209",
"url": "https://www.suse.com/security/cve/CVE-2023-54209"
},
{
"category": "external",
"summary": "SUSE Bug 1255963 for CVE-2023-54209",
"url": "https://bugzilla.suse.com/1255963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54209"
},
{
"cve": "CVE-2023-54210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54210"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()\n\nKASAN reports that there\u0027s a use-after-free in\nhci_remove_adv_monitor(). Trawling through the disassembly, you can\nsee that the complaint is from the access in bt_dev_dbg() under the\nHCI_ADV_MONITOR_EXT_MSFT case. The problem case happens because\nmsft_remove_monitor() can end up freeing the monitor\nstructure. Specifically:\n hci_remove_adv_monitor() -\u003e\n msft_remove_monitor() -\u003e\n msft_remove_monitor_sync() -\u003e\n msft_le_cancel_monitor_advertisement_cb() -\u003e\n hci_free_adv_monitor()\n\nLet\u0027s fix the problem by just stashing the relevant data when it\u0027s\nstill valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54210",
"url": "https://www.suse.com/security/cve/CVE-2023-54210"
},
{
"category": "external",
"summary": "SUSE Bug 1255955 for CVE-2023-54210",
"url": "https://bugzilla.suse.com/1255955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "important"
}
],
"title": "CVE-2023-54210"
},
{
"cve": "CVE-2023-54211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54211"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix warning in trace_buffered_event_disable()\n\nWarning happened in trace_buffered_event_disable() at\n WARN_ON_ONCE(!trace_buffered_event_ref)\n\n Call Trace:\n ? __warn+0xa5/0x1b0\n ? trace_buffered_event_disable+0x189/0x1b0\n __ftrace_event_enable_disable+0x19e/0x3e0\n free_probe_data+0x3b/0xa0\n unregister_ftrace_function_probe_func+0x6b8/0x800\n event_enable_func+0x2f0/0x3d0\n ftrace_process_regex.isra.0+0x12d/0x1b0\n ftrace_filter_write+0xe6/0x140\n vfs_write+0x1c9/0x6f0\n [...]\n\nThe cause of the warning is in __ftrace_event_enable_disable(),\ntrace_buffered_event_enable() was called once while\ntrace_buffered_event_disable() was called twice.\nReproduction script show as below, for analysis, see the comments:\n ```\n #!/bin/bash\n\n cd /sys/kernel/tracing/\n\n # 1. Register a \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was set;\n # 2) trace_buffered_event_enable() was called first time;\n echo \u0027cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n\n # 2. Enable the event registered, then:\n # 1) SOFT_DISABLED_BIT was cleared;\n # 2) trace_buffered_event_disable() was called first time;\n echo 1 \u003e events/initcall/initcall_finish/enable\n\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\n # set again!!!\n cat /proc/cmdline\n\n # 4. Unregister the \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was cleared again;\n # 2) trace_buffered_event_disable() was called second time!!!\n echo \u0027!cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n ```\n\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\nlast time soft-mode disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54211",
"url": "https://www.suse.com/security/cve/CVE-2023-54211"
},
{
"category": "external",
"summary": "SUSE Bug 1255843 for CVE-2023-54211",
"url": "https://bugzilla.suse.com/1255843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54211"
},
{
"cve": "CVE-2023-54215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()\n\nFree the cpumask allocated by create_affinity_masks() before returning\nfrom the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54215",
"url": "https://www.suse.com/security/cve/CVE-2023-54215"
},
{
"category": "external",
"summary": "SUSE Bug 1255957 for CVE-2023-54215",
"url": "https://bugzilla.suse.com/1255957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54215"
},
{
"cve": "CVE-2023-54219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"IB/isert: Fix incorrect release of isert connection\"\n\nCommit: 699826f4e30a (\"IB/isert: Fix incorrect release of isert connection\") is\ncausing problems on OPA when DEVICE_REMOVAL is happening.\n\n ------------[ cut here ]------------\n WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359\nib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc\nscsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file\nrpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs\nrfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod\nopa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm\nib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core\nx86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt\nipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma\nintel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter\nacpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul\ncrc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci\nghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse\n CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1\n Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS\nSE5C610.86B.01.01.0014.121820151719 12/18/2015\n RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83\nc4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc \u003c0f\u003e 0b eb a1\n90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f\n RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206\n RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d\n RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640\n RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d\n R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18\n R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38\n FS: 00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0\n Call Trace:\n \u003cTASK\u003e\n ? __warn+0x80/0x130\n ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n ? report_bug+0x195/0x1a0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x14/0x70\n ? asm_exc_invalid_op+0x16/0x20\n ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n disable_device+0x9d/0x160 [ib_core]\n __ib_unregister_device+0x42/0xb0 [ib_core]\n ib_unregister_device+0x22/0x30 [ib_core]\n rvt_unregister_device+0x20/0x90 [rdmavt]\n hfi1_unregister_ib_device+0x16/0xf0 [hfi1]\n remove_one+0x55/0x1a0 [hfi1]\n pci_device_remove+0x36/0xa0\n device_release_driver_internal+0x193/0x200\n driver_detach+0x44/0x90\n bus_remove_driver+0x69/0xf0\n pci_unregister_driver+0x2a/0xb0\n hfi1_mod_cleanup+0xc/0x3c [hfi1]\n __do_sys_delete_module.constprop.0+0x17a/0x2f0\n ? exit_to_user_mode_prepare+0xc4/0xd0\n ? syscall_trace_enter.constprop.0+0x126/0x1a0\n do_syscall_64+0x5c/0x90\n ? syscall_exit_to_user_mode+0x12/0x30\n ? do_syscall_64+0x69/0x90\n ? syscall_exit_work+0x103/0x130\n ? syscall_exit_to_user_mode+0x12/0x30\n ? do_syscall_64+0x69/0x90\n ? exc_page_fault+0x65/0x150\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n RIP: 0033:0x7ff1e643f5ab\n Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3\n66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 \u003c48\u003e 3d 01 f0\nff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48\n RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\n RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab\n RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8\n RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000\n R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8\n R13: 00000000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54219",
"url": "https://www.suse.com/security/cve/CVE-2023-54219"
},
{
"category": "external",
"summary": "SUSE Bug 1256231 for CVE-2023-54219",
"url": "https://bugzilla.suse.com/1256231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54219"
},
{
"cve": "CVE-2023-54220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Fix oops for port-\u003epm on uart_change_pm()\n\nUnloading a hardware specific 8250 driver can produce error \"Unable to\nhandle kernel paging request at virtual address\" about ten seconds after\nunloading the driver. This happens on uart_hangup() calling\nuart_change_pm().\n\nTurns out commit 04e82793f068 (\"serial: 8250: Reinit port-\u003epm on port\nspecific driver unbind\") was only a partial fix. If the hardware specific\ndriver has initialized port-\u003epm function, we need to clear port-\u003epm too.\nJust reinitializing port-\u003eops does not do this. Otherwise serial8250_pm()\nwill call port-\u003epm() instead of serial8250_do_pm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54220",
"url": "https://www.suse.com/security/cve/CVE-2023-54220"
},
{
"category": "external",
"summary": "SUSE Bug 1255949 for CVE-2023-54220",
"url": "https://bugzilla.suse.com/1255949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54220"
},
{
"cve": "CVE-2023-54221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe\n\nIn function probe(), it returns directly without unregistered hws\nwhen error occurs.\n\nFix this by adding \u0027goto unregister_hws;\u0027 on line 295 and\nline 310.\n\nUse devm_kzalloc() instead of kzalloc() to automatically\nfree the memory using devm_kfree() when error occurs.\n\nReplace of_iomap() with devm_of_iomap() to automatically\nhandle the unused ioremap region and delete \u0027iounmap(anatop_base);\u0027\nin unregister_hws.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54221",
"url": "https://www.suse.com/security/cve/CVE-2023-54221"
},
{
"category": "external",
"summary": "SUSE Bug 1255842 for CVE-2023-54221",
"url": "https://bugzilla.suse.com/1255842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "low"
}
],
"title": "CVE-2023-54221"
},
{
"cve": "CVE-2023-54223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: xsk: Fix invalid buffer access for legacy rq\n\nThe below crash can be encountered when using xdpsock in rx mode for\nlegacy rq: the buffer gets released in the XDP_REDIRECT path, and then\nonce again in the driver. This fix sets the flag to avoid releasing on\nthe driver side.\n\nXSK handling of buffers for legacy rq was relying on the caller to set\nthe skip release flag. But the referenced fix started using fragment\ncounts for pages instead of the skip flag.\n\nCrash log:\n general protection fault, probably for non-canonical address 0xffff8881217e3a: 0000 [#1] SMP\n CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 6.5.0-rc1+ #31\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:bpf_prog_03b13f331978c78c+0xf/0x28\n Code: ...\n RSP: 0018:ffff88810082fc98 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888138404901 RCX: c0ffffc900027cbc\n RDX: ffffffffa000b514 RSI: 00ffff8881217e32 RDI: ffff888138404901\n RBP: ffff88810082fc98 R08: 0000000000091100 R09: 0000000000000006\n R10: 0000000000000800 R11: 0000000000000800 R12: ffffc9000027a000\n R13: ffff8881217e2dc0 R14: ffff8881217e2910 R15: ffff8881217e2f00\n FS: 0000000000000000(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000564cb2e2cde0 CR3: 000000010e603004 CR4: 0000000000370eb0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n ? die_addr+0x32/0x80\n ? exc_general_protection+0x192/0x390\n ? asm_exc_general_protection+0x22/0x30\n ? 0xffffffffa000b514\n ? bpf_prog_03b13f331978c78c+0xf/0x28\n mlx5e_xdp_handle+0x48/0x670 [mlx5_core]\n ? dev_gro_receive+0x3b5/0x6e0\n mlx5e_xsk_skb_from_cqe_linear+0x6e/0x90 [mlx5_core]\n mlx5e_handle_rx_cqe+0x55/0x100 [mlx5_core]\n mlx5e_poll_rx_cq+0x87/0x6e0 [mlx5_core]\n mlx5e_napi_poll+0x45e/0x6b0 [mlx5_core]\n __napi_poll+0x25/0x1a0\n net_rx_action+0x28a/0x300\n __do_softirq+0xcd/0x279\n ? sort_range+0x20/0x20\n run_ksoftirqd+0x1a/0x20\n smpboot_thread_fn+0xa2/0x130\n kthread+0xc9/0xf0\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n Modules linked in: mlx5_ib mlx5_core rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter overlay zram zsmalloc fuse [last unloaded: mlx5_core]\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54223",
"url": "https://www.suse.com/security/cve/CVE-2023-54223"
},
{
"category": "external",
"summary": "SUSE Bug 1256233 for CVE-2023-54223",
"url": "https://bugzilla.suse.com/1256233"
},
{
"category": "external",
"summary": "SUSE Bug 1256253 for CVE-2023-54223",
"url": "https://bugzilla.suse.com/1256253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54223"
},
{
"cve": "CVE-2023-54224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix lockdep splat and potential deadlock after failure running delayed items\n\nWhen running delayed items we are holding a delayed node\u0027s mutex and then\nwe will attempt to modify a subvolume btree to insert/update/delete the\ndelayed items. However if have an error during the insertions for example,\nbtrfs_insert_delayed_items() may return with a path that has locked extent\nbuffers (a leaf at the very least), and then we attempt to release the\ndelayed node at __btrfs_run_delayed_items(), which requires taking the\ndelayed node\u0027s mutex, causing an ABBA type of deadlock. This was reported\nby syzbot and the lockdep splat is the following:\n\n WARNING: possible circular locking dependency detected\n 6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted\n ------------------------------------------------------\n syz-executor.2/13257 is trying to acquire lock:\n ffff88801835c0c0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n\n but task is already holding lock:\n ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #1 (btrfs-tree-00){++++}-{3:3}:\n __lock_release kernel/locking/lockdep.c:5475 [inline]\n lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781\n up_write+0x79/0x580 kernel/locking/rwsem.c:1625\n btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline]\n btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239\n search_leaf fs/btrfs/ctree.c:1986 [inline]\n btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230\n btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376\n btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline]\n btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline]\n __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111\n __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153\n flush_space+0x269/0xe70 fs/btrfs/space-info.c:723\n btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078\n process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600\n worker_thread+0xa63/0x1210 kernel/workqueue.c:2751\n kthread+0x2b8/0x350 kernel/kthread.c:389\n ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\n -\u003e #0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}:\n check_prev_add kernel/locking/lockdep.c:3142 [inline]\n check_prevs_add kernel/locking/lockdep.c:3261 [inline]\n validate_chain kernel/locking/lockdep.c:3876 [inline]\n __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144\n lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761\n __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603\n __mutex_lock kernel/locking/mutex.c:747 [inline]\n mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799\n __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline]\n __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156\n btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276\n btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988\n vfs_fsync_range fs/sync.c:188 [inline]\n vfs_fsync fs/sync.c:202 [inline]\n do_fsync fs/sync.c:212 [inline]\n __do_sys_fsync fs/sync.c:220 [inline]\n __se_sys_fsync fs/sync.c:218 [inline]\n __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n other info that\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54224",
"url": "https://www.suse.com/security/cve/CVE-2023-54224"
},
{
"category": "external",
"summary": "SUSE Bug 1255951 for CVE-2023-54224",
"url": "https://bugzilla.suse.com/1255951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54224"
},
{
"cve": "CVE-2023-54225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipa: only reset hashed tables when supported\n\nLast year, the code that manages GSI channel transactions switched\nfrom using spinlock-protected linked lists to using indexes into the\nring buffer used for a channel. Recently, Google reported seeing\ntransaction reference count underflows occasionally during shutdown.\n\nDoug Anderson found a way to reproduce the issue reliably, and\nbisected the issue to the commit that eliminated the linked lists\nand the lock. The root cause was ultimately determined to be\nrelated to unused transactions being committed as part of the modem\nshutdown cleanup activity. Unused transactions are not normally\nexpected (except in error cases).\n\nThe modem uses some ranges of IPA-resident memory, and whenever it\nshuts down we zero those ranges. In ipa_filter_reset_table() a\ntransaction is allocated to zero modem filter table entries. If\nhashing is not supported, hashed table memory should not be zeroed.\nBut currently nothing prevents that, and the result is an unused\ntransaction. Something similar occurs when we zero routing table\nentries for the modem.\n\nBy preventing any attempt to clear hashed tables when hashing is not\nsupported, the reference count underflow is avoided in this case.\n\nNote that there likely remains an issue with properly freeing unused\ntransactions (if they occur due to errors). This patch addresses\nonly the underflows that Google originally reported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54225",
"url": "https://www.suse.com/security/cve/CVE-2023-54225"
},
{
"category": "external",
"summary": "SUSE Bug 1256234 for CVE-2023-54225",
"url": "https://bugzilla.suse.com/1256234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54225"
},
{
"cve": "CVE-2023-54227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54227"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix tags leak when shrink nr_hw_queues\n\nAlthough we don\u0027t need to realloc set-\u003etags[] when shrink nr_hw_queues,\nwe need to free them. Or these tags will be leaked.\n\nHow to reproduce:\n1. mount -t configfs configfs /mnt\n2. modprobe null_blk nr_devices=0 submit_queues=8\n3. mkdir /mnt/nullb/nullb0\n4. echo 1 \u003e /mnt/nullb/nullb0/power\n5. echo 4 \u003e /mnt/nullb/nullb0/submit_queues\n6. rmdir /mnt/nullb/nullb0\n\nIn step 4, will alloc 9 tags (8 submit queues and 1 poll queue), then\nin step 5, new_nr_hw_queues = 5 (4 submit queues and 1 poll queue).\nAt last in step 6, only these 5 tags are freed, the other 4 tags leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54227",
"url": "https://www.suse.com/security/cve/CVE-2023-54227"
},
{
"category": "external",
"summary": "SUSE Bug 1255952 for CVE-2023-54227",
"url": "https://bugzilla.suse.com/1255952"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54227"
},
{
"cve": "CVE-2023-54229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix registration of 6Ghz-only phy without the full channel range\n\nBecause of what seems to be a typo, a 6Ghz-only phy for which the BDF\ndoes not allow the 7115Mhz channel will fail to register:\n\n WARNING: CPU: 2 PID: 106 at net/wireless/core.c:907 wiphy_register+0x914/0x954\n Modules linked in: ath11k_pci sbsa_gwdt\n CPU: 2 PID: 106 Comm: kworker/u8:5 Not tainted 6.3.0-rc7-next-20230418-00549-g1e096a17625a-dirty #9\n Hardware name: Freebox V7R Board (DT)\n Workqueue: ath11k_qmi_driver_event ath11k_qmi_driver_event_work\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : wiphy_register+0x914/0x954\n lr : ieee80211_register_hw+0x67c/0xc10\n sp : ffffff800b123aa0\n x29: ffffff800b123aa0 x28: 0000000000000000 x27: 0000000000000000\n x26: 0000000000000000 x25: 0000000000000006 x24: ffffffc008d51418\n x23: ffffffc008cb0838 x22: ffffff80176c2460 x21: 0000000000000168\n x20: ffffff80176c0000 x19: ffffff80176c03e0 x18: 0000000000000014\n x17: 00000000cbef338c x16: 00000000d2a26f21 x15: 00000000ad6bb85f\n x14: 0000000000000020 x13: 0000000000000020 x12: 00000000ffffffbd\n x11: 0000000000000208 x10: 00000000fffffdf7 x9 : ffffffc009394718\n x8 : ffffff80176c0528 x7 : 000000007fffffff x6 : 0000000000000006\n x5 : 0000000000000005 x4 : ffffff800b304284 x3 : ffffff800b304284\n x2 : ffffff800b304d98 x1 : 0000000000000000 x0 : 0000000000000000\n Call trace:\n wiphy_register+0x914/0x954\n ieee80211_register_hw+0x67c/0xc10\n ath11k_mac_register+0x7c4/0xe10\n ath11k_core_qmi_firmware_ready+0x1f4/0x570\n ath11k_qmi_driver_event_work+0x198/0x590\n process_one_work+0x1b8/0x328\n worker_thread+0x6c/0x414\n kthread+0x100/0x104\n ret_from_fork+0x10/0x20\n ---[ end trace 0000000000000000 ]---\n ath11k_pci 0002:01:00.0: ieee80211 registration failed: -22\n ath11k_pci 0002:01:00.0: failed register the radio with mac80211: -22\n ath11k_pci 0002:01:00.0: failed to create pdev core: -22",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54229",
"url": "https://www.suse.com/security/cve/CVE-2023-54229"
},
{
"category": "external",
"summary": "SUSE Bug 1255924 for CVE-2023-54229",
"url": "https://bugzilla.suse.com/1255924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54229"
},
{
"cve": "CVE-2023-54230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namba: bus: fix refcount leak\n\ncommit 5de1540b7bc4 (\"drivers/amba: create devices from device tree\")\nincreases the refcount of of_node, but not releases it in\namba_device_release, so there is refcount leak. By using of_node_put\nto avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54230",
"url": "https://www.suse.com/security/cve/CVE-2023-54230"
},
{
"category": "external",
"summary": "SUSE Bug 1255925 for CVE-2023-54230",
"url": "https://bugzilla.suse.com/1255925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54230"
},
{
"cve": "CVE-2023-54235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/DOE: Fix destroy_work_on_stack() race\n\nThe following debug object splat was observed in testing:\n\n ODEBUG: free active (active state 0) object: 0000000097d23782 object type: work_struct hint: doe_statemachine_work+0x0/0x510\n WARNING: CPU: 1 PID: 71 at lib/debugobjects.c:514 debug_print_object+0x7d/0xb0\n ...\n Workqueue: pci 0000:36:00.0 DOE [1 doe_statemachine_work\n RIP: 0010:debug_print_object+0x7d/0xb0\n ...\n Call Trace:\n ? debug_print_object+0x7d/0xb0\n ? __pfx_doe_statemachine_work+0x10/0x10\n debug_object_free.part.0+0x11b/0x150\n doe_statemachine_work+0x45e/0x510\n process_one_work+0x1d4/0x3c0\n\nThis occurs because destroy_work_on_stack() was called after signaling\nthe completion in the calling thread. This creates a race between\ndestroy_work_on_stack() and the task-\u003ework struct going out of scope in\npci_doe().\n\nSignal the work complete after destroying the work struct. This is safe\nbecause signal_task_complete() is the final thing the work item does and\nthe workqueue code is careful not to access the work struct after.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54235",
"url": "https://www.suse.com/security/cve/CVE-2023-54235"
},
{
"category": "external",
"summary": "SUSE Bug 1255921 for CVE-2023-54235",
"url": "https://bugzilla.suse.com/1255921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54235"
},
{
"cve": "CVE-2023-54240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all()\n\nrule_locs is allocated in ethtool_get_rxnfc and the size is determined by\nrule_cnt from user space. So rule_cnt needs to be check before using\nrule_locs to avoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54240",
"url": "https://www.suse.com/security/cve/CVE-2023-54240"
},
{
"category": "external",
"summary": "SUSE Bug 1255918 for CVE-2023-54240",
"url": "https://bugzilla.suse.com/1255918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54240"
},
{
"cve": "CVE-2023-54241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54241"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: KVM: Fix NULL pointer dereference\n\nAfter commit 45c7e8af4a5e3f0bea4ac209 (\"MIPS: Remove KVM_TE support\") we\nget a NULL pointer dereference when creating a KVM guest:\n\n[ 146.243409] Starting KVM with MIPS VZ extensions\n[ 149.849151] CPU 3 Unable to handle kernel paging request at virtual address 0000000000000300, epc == ffffffffc06356ec, ra == ffffffffc063568c\n[ 149.849177] Oops[#1]:\n[ 149.849182] CPU: 3 PID: 2265 Comm: qemu-system-mip Not tainted 6.4.0-rc3+ #1671\n[ 149.849188] Hardware name: THTF CX TL630 Series/THTF-LS3A4000-7A1000-ML4A, BIOS KL4.1F.TF.D.166.201225.R 12/25/2020\n[ 149.849192] $ 0 : 0000000000000000 000000007400cce0 0000000000400004 ffffffff8119c740\n[ 149.849209] $ 4 : 000000007400cce1 000000007400cce1 0000000000000000 0000000000000000\n[ 149.849221] $ 8 : 000000240058bb36 ffffffff81421ac0 0000000000000000 0000000000400dc0\n[ 149.849233] $12 : 9800000102a07cc8 ffffffff80e40e38 0000000000000001 0000000000400dc0\n[ 149.849245] $16 : 0000000000000000 9800000106cd0000 9800000106cd0000 9800000100cce000\n[ 149.849257] $20 : ffffffffc0632b28 ffffffffc05b31b0 9800000100ccca00 0000000000400000\n[ 149.849269] $24 : 9800000106cd09ce ffffffff802f69d0\n[ 149.849281] $28 : 9800000102a04000 9800000102a07cd0 98000001106a8000 ffffffffc063568c\n[ 149.849293] Hi : 00000335b2111e66\n[ 149.849295] Lo : 6668d90061ae0ae9\n[ 149.849298] epc : ffffffffc06356ec kvm_vz_vcpu_setup+0xc4/0x328 [kvm]\n[ 149.849324] ra : ffffffffc063568c kvm_vz_vcpu_setup+0x64/0x328 [kvm]\n[ 149.849336] Status: 7400cce3 KX SX UX KERNEL EXL IE\n[ 149.849351] Cause : 1000000c (ExcCode 03)\n[ 149.849354] BadVA : 0000000000000300\n[ 149.849357] PrId : 0014c004 (ICT Loongson-3)\n[ 149.849360] Modules linked in: kvm nfnetlink_queue nfnetlink_log nfnetlink fuse sha256_generic libsha256 cfg80211 rfkill binfmt_misc vfat fat snd_hda_codec_hdmi input_leds led_class snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core snd_pcm snd_timer snd serio_raw xhci_pci radeon drm_suballoc_helper drm_display_helper xhci_hcd ip_tables x_tables\n[ 149.849432] Process qemu-system-mip (pid: 2265, threadinfo=00000000ae2982d2, task=0000000038e09ad4, tls=000000ffeba16030)\n[ 149.849439] Stack : 9800000000000003 9800000100ccca00 9800000100ccc000 ffffffffc062cef4\n[ 149.849453] 9800000102a07d18 c89b63a7ab338e00 0000000000000000 ffffffff811a0000\n[ 149.849465] 0000000000000000 9800000106cd0000 ffffffff80e59938 98000001106a8920\n[ 149.849476] ffffffff80e57f30 ffffffffc062854c ffffffff811a0000 9800000102bf4240\n[ 149.849488] ffffffffc05b0000 ffffffff80e3a798 000000ff78000000 000000ff78000010\n[ 149.849500] 0000000000000255 98000001021f7de0 98000001023f0078 ffffffff81434000\n[ 149.849511] 0000000000000000 0000000000000000 9800000102ae0000 980000025e92ae28\n[ 149.849523] 0000000000000000 c89b63a7ab338e00 0000000000000001 ffffffff8119dce0\n[ 149.849535] 000000ff78000010 ffffffff804f3d3c 9800000102a07eb0 0000000000000255\n[ 149.849546] 0000000000000000 ffffffff8049460c 000000ff78000010 0000000000000255\n[ 149.849558] ...\n[ 149.849565] Call Trace:\n[ 149.849567] [\u003cffffffffc06356ec\u003e] kvm_vz_vcpu_setup+0xc4/0x328 [kvm]\n[ 149.849586] [\u003cffffffffc062cef4\u003e] kvm_arch_vcpu_create+0x184/0x228 [kvm]\n[ 149.849605] [\u003cffffffffc062854c\u003e] kvm_vm_ioctl+0x64c/0xf28 [kvm]\n[ 149.849623] [\u003cffffffff805209c0\u003e] sys_ioctl+0xc8/0x118\n[ 149.849631] [\u003cffffffff80219eb0\u003e] syscall_common+0x34/0x58\n\nThe root cause is the deletion of kvm_mips_commpage_init() leaves vcpu\n-\u003earch.cop0 NULL. So fix it by making cop0 from a pointer to an embedded\nobject.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54241",
"url": "https://www.suse.com/security/cve/CVE-2023-54241"
},
{
"category": "external",
"summary": "SUSE Bug 1255838 for CVE-2023-54241",
"url": "https://bugzilla.suse.com/1255838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54241"
},
{
"cve": "CVE-2023-54246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54246"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()\n\nThe rcuscale.holdoff module parameter can be used to delay the start\nof rcu_scale_writer() kthread. However, the hung-task timeout will\ntrigger when the timeout specified by rcuscale.holdoff is greater than\nhung_task_timeout_secs:\n\nrunqemu kvm nographic slirp qemuparams=\"-smp 4 -m 2048M\"\nbootparams=\"rcuscale.shutdown=0 rcuscale.holdoff=300\"\n\n[ 247.071753] INFO: task rcu_scale_write:59 blocked for more than 122 seconds.\n[ 247.072529] Not tainted 6.4.0-rc1-00134-gb9ed6de8d4ff #7\n[ 247.073400] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 247.074331] task:rcu_scale_write state:D stack:30144 pid:59 ppid:2 flags:0x00004000\n[ 247.075346] Call Trace:\n[ 247.075660] \u003cTASK\u003e\n[ 247.075965] __schedule+0x635/0x1280\n[ 247.076448] ? __pfx___schedule+0x10/0x10\n[ 247.076967] ? schedule_timeout+0x2dc/0x4d0\n[ 247.077471] ? __pfx_lock_release+0x10/0x10\n[ 247.078018] ? enqueue_timer+0xe2/0x220\n[ 247.078522] schedule+0x84/0x120\n[ 247.078957] schedule_timeout+0x2e1/0x4d0\n[ 247.079447] ? __pfx_schedule_timeout+0x10/0x10\n[ 247.080032] ? __pfx_rcu_scale_writer+0x10/0x10\n[ 247.080591] ? __pfx_process_timeout+0x10/0x10\n[ 247.081163] ? __pfx_sched_set_fifo_low+0x10/0x10\n[ 247.081760] ? __pfx_rcu_scale_writer+0x10/0x10\n[ 247.082287] rcu_scale_writer+0x6b1/0x7f0\n[ 247.082773] ? mark_held_locks+0x29/0xa0\n[ 247.083252] ? __pfx_rcu_scale_writer+0x10/0x10\n[ 247.083865] ? __pfx_rcu_scale_writer+0x10/0x10\n[ 247.084412] kthread+0x179/0x1c0\n[ 247.084759] ? __pfx_kthread+0x10/0x10\n[ 247.085098] ret_from_fork+0x2c/0x50\n[ 247.085433] \u003c/TASK\u003e\n\nThis commit therefore replaces schedule_timeout_uninterruptible() with\nschedule_timeout_idle().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54246",
"url": "https://www.suse.com/security/cve/CVE-2023-54246"
},
{
"category": "external",
"summary": "SUSE Bug 1255915 for CVE-2023-54246",
"url": "https://bugzilla.suse.com/1255915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54246"
},
{
"cve": "CVE-2023-54247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Silence a warning in btf_type_id_size()\n\nsyzbot reported a warning in [1] with the following stacktrace:\n WARNING: CPU: 0 PID: 5005 at kernel/bpf/btf.c:1988 btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988\n ...\n RIP: 0010:btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988\n ...\n Call Trace:\n \u003cTASK\u003e\n map_check_btf kernel/bpf/syscall.c:1024 [inline]\n map_create+0x1157/0x1860 kernel/bpf/syscall.c:1198\n __sys_bpf+0x127f/0x5420 kernel/bpf/syscall.c:5040\n __do_sys_bpf kernel/bpf/syscall.c:5162 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5160 [inline]\n __x64_sys_bpf+0x79/0xc0 kernel/bpf/syscall.c:5160\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nWith the following btf\n [1] DECL_TAG \u0027a\u0027 type_id=4 component_idx=-1\n [2] PTR \u0027(anon)\u0027 type_id=0\n [3] TYPE_TAG \u0027a\u0027 type_id=2\n [4] VAR \u0027a\u0027 type_id=3, linkage=static\nand when the bpf_attr.btf_key_type_id = 1 (DECL_TAG),\nthe following WARN_ON_ONCE in btf_type_id_size() is triggered:\n if (WARN_ON_ONCE(!btf_type_is_modifier(size_type) \u0026\u0026\n !btf_type_is_var(size_type)))\n return NULL;\n\nNote that \u0027return NULL\u0027 is the correct behavior as we don\u0027t want\na DECL_TAG type to be used as a btf_{key,value}_type_id even\nfor the case like \u0027DECL_TAG -\u003e STRUCT\u0027. So there\nis no correctness issue here, we just want to silence warning.\n\nTo silence the warning, I added DECL_TAG as one of kinds in\nbtf_type_nosize() which will cause btf_type_id_size() returning\nNULL earlier without the warning.\n\n [1] https://lore.kernel.org/bpf/000000000000e0df8d05fc75ba86@google.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54247",
"url": "https://www.suse.com/security/cve/CVE-2023-54247"
},
{
"category": "external",
"summary": "SUSE Bug 1255892 for CVE-2023-54247",
"url": "https://bugzilla.suse.com/1255892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54247"
},
{
"cve": "CVE-2023-54251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54251"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.\n\nsyzkaller found zero division error [0] in div_s64_rem() called from\nget_cycle_time_elapsed(), where sched-\u003ecycle_time is the divisor.\n\nWe have tests in parse_taprio_schedule() so that cycle_time will never\nbe 0, and actually cycle_time is not 0 in get_cycle_time_elapsed().\n\nThe problem is that the types of divisor are different; cycle_time is\ns64, but the argument of div_s64_rem() is s32.\n\nsyzkaller fed this input and 0x100000000 is cast to s32 to be 0.\n\n @TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0x100000000}\n\nWe use s64 for cycle_time to cast it to ktime_t, so let\u0027s keep it and\nset max for cycle_time.\n\nWhile at it, we prevent overflow in setup_txtime() and add another\ntest in parse_taprio_schedule() to check if cycle_time overflows.\n\nAlso, we add a new tdc test case for this issue.\n\n[0]:\ndivide error: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 1 PID: 103 Comm: kworker/1:3 Not tainted 6.5.0-rc1-00330-g60cc1f7d0605 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: ipv6_addrconf addrconf_dad_work\nRIP: 0010:div_s64_rem include/linux/math64.h:42 [inline]\nRIP: 0010:get_cycle_time_elapsed net/sched/sch_taprio.c:223 [inline]\nRIP: 0010:find_entry_to_transmit+0x252/0x7e0 net/sched/sch_taprio.c:344\nCode: 3c 02 00 0f 85 5e 05 00 00 48 8b 4c 24 08 4d 8b bd 40 01 00 00 48 8b 7c 24 48 48 89 c8 4c 29 f8 48 63 f7 48 99 48 89 74 24 70 \u003c48\u003e f7 fe 48 29 d1 48 8d 04 0f 49 89 cc 48 89 44 24 20 49 8d 85 10\nRSP: 0018:ffffc90000acf260 EFLAGS: 00010206\nRAX: 177450e0347560cf RBX: 0000000000000000 RCX: 177450e0347560cf\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000100000000\nRBP: 0000000000000056 R08: 0000000000000000 R09: ffffed10020a0934\nR10: ffff8880105049a7 R11: ffff88806cf3a520 R12: ffff888010504800\nR13: ffff88800c00d800 R14: ffff8880105049a0 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f0edf84f0e8 CR3: 000000000d73c002 CR4: 0000000000770ee0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n get_packet_txtime net/sched/sch_taprio.c:508 [inline]\n taprio_enqueue_one+0x900/0xff0 net/sched/sch_taprio.c:577\n taprio_enqueue+0x378/0xae0 net/sched/sch_taprio.c:658\n dev_qdisc_enqueue+0x46/0x170 net/core/dev.c:3732\n __dev_xmit_skb net/core/dev.c:3821 [inline]\n __dev_queue_xmit+0x1b2f/0x3000 net/core/dev.c:4169\n dev_queue_xmit include/linux/netdevice.h:3088 [inline]\n neigh_resolve_output net/core/neighbour.c:1552 [inline]\n neigh_resolve_output+0x4a7/0x780 net/core/neighbour.c:1532\n neigh_output include/net/neighbour.h:544 [inline]\n ip6_finish_output2+0x924/0x17d0 net/ipv6/ip6_output.c:135\n __ip6_finish_output+0x620/0xaa0 net/ipv6/ip6_output.c:196\n ip6_finish_output net/ipv6/ip6_output.c:207 [inline]\n NF_HOOK_COND include/linux/netfilter.h:292 [inline]\n ip6_output+0x206/0x410 net/ipv6/ip6_output.c:228\n dst_output include/net/dst.h:458 [inline]\n NF_HOOK.constprop.0+0xea/0x260 include/linux/netfilter.h:303\n ndisc_send_skb+0x872/0xe80 net/ipv6/ndisc.c:508\n ndisc_send_ns+0xb5/0x130 net/ipv6/ndisc.c:666\n addrconf_dad_work+0xc14/0x13f0 net/ipv6/addrconf.c:4175\n process_one_work+0x92c/0x13a0 kernel/workqueue.c:2597\n worker_thread+0x60f/0x1240 kernel/workqueue.c:2748\n kthread+0x2fe/0x3f0 kernel/kthread.c:389\n ret_from_fork+0x2c/0x50 arch/x86/entry/entry_64.S:308\n \u003c/TASK\u003e\nModules linked in:",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54251",
"url": "https://www.suse.com/security/cve/CVE-2023-54251"
},
{
"category": "external",
"summary": "SUSE Bug 1255888 for CVE-2023-54251",
"url": "https://bugzilla.suse.com/1255888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.84.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T11:36:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-54251"
},
{
"cve": "CVE-2023-54253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: set page extent mapped after read_folio in relocate_one_page\n\nOne of the CI runs triggered the following panic\n\n assertion failed: PagePrivate(page) \u0026\u0026 page-\u003eprivate, in fs/btrfs/subpage.c:229\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/subpage.c:229!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 0 PID: 923660 Comm: btrfs Not tainted 6.5.0-rc3+ #1\n pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : btrfs_subpage_assert+0xbc/0xf0\n lr : btrfs_subpage_assert+0xbc/0xf0\n sp : ffff800093213720\n x29: ffff800093213720 x28: ffff8000932138b4 x27: 000000000c280000\n x26: 00000001b5d00000 x25: 000000000c281000 x24: 000000000c281fff\n x23: 0000000000001000 x22: 0000000000000000 x21: ffffff42b95bf880\n x20: ffff42b9528e0000 x19: 0000000000001000 x18: ffffffffffffffff\n x17: 667274622f736620 x16: 6e69202c65746176 x15: 0000000000000028\n x14: 0000000000000003 x13: 00000000002672d7 x12: 0000000000000000\n x11: ffffcd3f0ccd9204 x10: ffffcd3f0554ae50 x9 : ffffcd3f0379528c\n x8 : ffff800093213428 x7 : 0000000000000000 x6 : ffffcd3f091771e8\n x5 : ffff42b97f333948 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : ffff42b9556cde80 x0 : 000000000000004f\n Call trace:\n btrfs_subpage_assert+0xbc/0xf0\n btrfs_subpage_set_dirty+0x38/0xa0\n btrfs_page_set_dirty+0x58/0x88\n relocate_one_page+0x204/0x5f0\n relocate_file_extent_cluster+0x11c/0x180\n relocate_data_extent+0xd0/0xf8\n relocate_block_group+0x3d0/0x4e8\n btrfs_relocate_block_group+0x2d8/0x490\n btrfs_relocate_chunk+0x54/0x1a8\n btrfs_balance+0x7f4/0x1150\n btrfs_ioctl+0x10f0/0x20b8\n __arm64_sys_ioctl+0x120/0x11d8\n invoke_syscall.constprop.0+0x80/0xd8\n do_el0_svc+0x6c/0x158\n el0_svc+0x50/0x1b0\n el0t_64_sync_handler+0x120/0x130\n el0t_64_sync+0x194/0x198\n Code: 91098021 b0007fa0 91346000 97e9c6d2 (d4210000)\n\nThis is the same problem outlined in 17b17fcd6d44 (\"btrfs:\nset_page_extent_mapped after read_folio in btrfs_cont_expand\") , and the\nfix is the same. I originally looked for the same pattern elsewhere in\nour code, but mistakenly skipped over this code because I saw the page\ncache readahead before we set_page_extent_mapped, not realizing that\nthis was only in the !page case, that we can still end up with a\n!uptodate page and then do the btrfs_read_folio further down.\n\nThe fix here is the same as the above mentioned patch, move the\nset_page_extent_mapped call to after the btrfs_read_folio() block to\nmake sure that we have the subpage blocksize stuff setup properly before\nusing the page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.84.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-defaul